M3: User authentication, IAM - C.3 & C.5 Flashcards
What is the main purpose of user authentication?
M3: User authentication, IAM - C.3 & C.5
To verify an asserted identity using supporting evidence.
What is the difference between authentication and identification?
M3: User authentication, IAM - C.3 & C.5
Authentication verifies an asserted identity, while identification finds an identity from available information.
Why are passwords still widely used despite their weaknesses?
M3: User authentication, IAM - C.3 & C.5
They are simple, easy to learn, free, and require no extra hardware.
What is a pre-computed dictionary attack?
M3: User authentication, IAM - C.3 & C.5
An attack where an attacker uses a pre-made list of hashed passwords to find matches in a stolen password file.
How does storing password hashes improve security?
M3: User authentication, IAM - C.3 & C.5
It prevents direct exposure of passwords if the password file is stolen.
What is password salting?
M3: User authentication, IAM - C.3 & C.5
Adding a random value to a password before hashing to make dictionary attacks harder.
What is iterated hashing (password stretching)?
M3: User authentication, IAM - C.3 & C.5
Hashing a password multiple times to slow down offline guessing attacks.
What is a pepper in password security?
M3: User authentication, IAM - C.3 & C.5
A secret salt not stored with the password, used to further slow down attacks.
What are the disadvantages of passwords?
M3: User authentication, IAM - C.3 & C.5
They can be hard to remember, vulnerable to various attacks, and require frequent changes.
What is an online password guessing attack?
M3: User authentication, IAM - C.3 & C.5
An attack where guesses are sent to the legitimate server to find the correct password.
What is an offline password guessing attack?
M3: User authentication, IAM - C.3 & C.5
An attack where the attacker uses a stolen password hash file to guess passwords without contacting the server.
What is a one-time password (OTP)?
M3: User authentication, IAM - C.3 & C.5
A password that is valid for only one use, improving security against replay attacks.
How do SIM swap attacks work?
M3: User authentication, IAM - C.3 & C.5
Attackers trick a mobile provider into transferring a victim’s number to a new SIM card to intercept OTPs.
What are secret questions used for?
M3: User authentication, IAM - C.3 & C.5
To recover access to accounts when passwords are forgotten.
Why are secret questions considered weak for security?
M3: User authentication, IAM - C.3 & C.5
Answers are often easy to guess or find out, making them less secure than passwords.