MODULE 3 Flashcards

1
Q

User authentication:

A

Establishing confidence in user identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Claimant:

A

A party to be authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

User authentication methods:

A
  • Password-based
  • Token-based
  • Static biometrics
  • Dynamic biometrics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risk assessment for user authentication:

A
  • Assurance level
  • Potential impact
  • Areas of risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Password vulnerabilities:

A
  • Popular password attack
  • Offline dictionary attack
  • Workstation hijacking
  • Guessing password against single user
  • Exploiting user mistakes
  • Exploiting multiple password use
  • Specific account attack
  • Electronic monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Countermeasures for password vulnerabilities:

A
  • Intrusion detection
  • Encrypted networks
  • Policies against common passwords
  • Account lockout
  • Stop unauthorized access to password file
  • Training
  • Automatic logout
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Need for a salt value:

A
  • Prevent duplicates in password file
  • Increase difficulty of offline dictionary attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dictionary attack:

A

Comparing each word in a dictionary against hash in password file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

John the Ripper:

A

Open-source password cracker that combines brute-force and dictionary techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rainbow table:

A

A large dictionary of possible passwords and all salt values hashes of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Password file access control vulnerabilities:

A
  • Exploit OS bug
  • Permission accident
  • Users reusing passwords
  • Unprotected backup
  • Unprotected networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Drawbacks of memory cards:

A
  • Needs special readers
  • Loss of token
  • User dissatisfaction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Techniques for better passwords:

A
  • User education
  • Computer-generated passwords
  • Reactive password checking (periodic)
  • Proactive password checking (at selection)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Smartcard authentication types:

A
  • Static
  • Dynamic
  • Challenge-response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Biometric authentication:

A

Authenticate user based on physical characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly