M3: User authentication, IAM - C.3 & C.5 Flashcards

1
Q

What is the main purpose of user authentication?

A

To verify an asserted identity using supporting evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between authentication and identification?

A

Authentication verifies an asserted identity, while identification finds an identity from available information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are passwords still widely used despite their weaknesses?

A

They are simple, easy to learn, free, and require no extra hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a pre-computed dictionary attack?

A

An attack where an attacker uses a pre-made list of hashed passwords to find matches in a stolen password file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does storing password hashes improve security?

A

It prevents direct exposure of passwords if the password file is stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is password salting?

A

Adding a random value to a password before hashing to make dictionary attacks harder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is iterated hashing (password stretching)?

A

Hashing a password multiple times to slow down offline guessing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a pepper in password security?

A

A secret salt not stored with the password, used to further slow down attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the disadvantages of passwords?

A

They can be hard to remember, vulnerable to various attacks, and require frequent changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an online password guessing attack?

A

An attack where guesses are sent to the legitimate server to find the correct password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an offline password guessing attack?

A

An attack where the attacker uses a stolen password hash file to guess passwords without contacting the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a one-time password (OTP)?

A

A password that is valid for only one use, improving security against replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do SIM swap attacks work?

A

Attackers trick a mobile provider into transferring a victim’s number to a new SIM card to intercept OTPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are secret questions used for?

A

To recover access to accounts when passwords are forgotten.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are secret questions considered weak for security?

A

Answers are often easy to guess or find out, making them less secure than passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was the main security concern with early time-sharing systems?

A

Preventing one process from writing into another’s memory.

17
Q

What is a descriptor register used for in memory protection?

A

It constrains the addresses a process can access.

18
Q

What does the privileged bit do?

A

It allows only the supervisor code to load the descriptor register.

19
Q

Why is finer-grained memory control desirable?

A

To allow separate read, write, and execute permissions for different memory regions.

20
Q

What is a memory segment in the context of access permissions?

A

A continuous block of words representing a logical unit of information.

21
Q

What is the role of a User ID (UID) in operating systems?

A

It identifies the principal accountable for a process and grants access privileges.

22
Q

What is the reference monitor concept?

A

A model ensuring all access requests are validated against a list of authorized types of reference.

23
Q

What is an access matrix?

A

A model that defines authorized access permissions for each subject-object pair in a system.

24
Q

What are the three requirements for a reference validation mechanism?

A

It must be
* tamper-proof,
* always invoked
* verifiable.

25
Q

What is a capability list (C-list)?

A

A list detailing all access privileges a subject holds.

26
Q

What is an access control list (ACL)?

A

A list specifying permitted access modes on an object by different subjects.

27
Q

What does the setuid bit do for executable files?

A

It allows a process to run with the file owner’s privileges.

28
Q

What is the difference between real UID and effective UID?

A

Real UID denotes the process owner, while effective UID determines access privileges.

29
Q

What are the LAT bits for directory permissions?

A

Permissions for directories.
* List
* Alter
* Traverse

30
Q

What is the purpose of the setgid bit for directory files?

A

It allows files created within the directory to inherit the directory’s group ID.