Miscellaneous Authentication Technologies Flashcards

1
Q

SMS

A

This is used as an additional layer of security where the user is authenticated and a SMS message is sent to he user’s cell phone. They then insert the code and are authenticated. there is usually a time limit associated with its use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Token Key

A

Tokens can very from a hardware device that received a one-time password, that would normally last between 30-60 seconds, to the fob or card used to gain access to a building via a card reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Push Notification

A

An email is sent to the user when access to their system has been received by an unusual device; for example, if I access Dropbox from a friend’s laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phone Call

A

When someone has accessed a system, they may receive a phone call as an additional layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

JavaScript Object Notation Web Token (JWT)

A

JWT is an internet standard where the server signs a token with its private key and sends it to a user to prove who they are. It can also be used to digitally sign documents and email. It is used by OAuth. For example, it may be passed through an HTTP header to prove the identity of a user, sometimes known as a claim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Static Code

A

These codes change after a period of time, like a PIN for a smart card. These are commonly used by broadband engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication Applications

A

This could be using Kerberos, who completes a Ticket Granting Ticket (TGT) session that results in a ticket that can be exchanged to give access to applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly