Lecture 2 Flashcards
What are the two steps of authentication?
Identification and authentication
What are the four means of authenticating user identity based on?
- Something the individual knows
- Something the individual possesses
- Something the individual is
- Something the individual does
What is the role of the username/login ID?
Determines that the user is authorized to access the system.
Determines the user’s privileges.
What is the role of the password?
Confirms that the user is really who they claim they are.
Establishes trust and allows access to the resource.
What does an exhaustive search (brute force) password attack do?
It tries all possible combinations of valid symbols, up to a certain length.
What does an intelligent search password attack do?
It searches through a restricted name space, e.g., try passwords that are somehow associated with a user such as name, names of friends or relatives, car brand, phone numbers, etc.
True or false. Is a dictionary attack an example of an intelligent search?
TRUE
Name at least 3 password attack methods
Dictionary attack
Brute force attack
Password spoofing attack
Sniffing and key loggers attack
Shoulder surfing attack