Password Authentication Flashcards

1
Q

What are the two standard security functions?

A

IDentification of yourself as an authorised user

Authentication of yourself to the system as that user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an entity?

A

A user or a process in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do we need to determine about the entity for authentication?

A

What the entity knows - Password, Secret
What the entity has - badge, token
What the entity is - biometrics
where the entity is - IP, Geo Location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Gollman’s principle of security?

A

It is important to determine which layer of the system the security mechanism should be placed at.

IE: Applicaiton, OS, Kernel, Hardware…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What must a system store about an entity or principal in order to allow authentication?

A
Set of authentication information
Set of complementary information
Set of complementary functions
Set of authentication functions
Set of selection functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the set of authentication information and what is it used for?

A

The set of specific information required by entities to prove their identity (Passwords, tokens etc.)

This is used to bind an entity to an identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the set of complementary information and what is it used for?

A

Information stored on the system to validate the authentication information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the complementary functions used for?

A

These functions generate the complementary information given the authentication information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the set of authentication functions?

A

These are the functions that verify identity by returning whether or not the login criteria has been met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the set of selection functions?

A

Set of functions that allow an entity to create or alter the authentication and complementation functions, such as change passwords or request a new ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the password space?

A

The set of all password (all chars, in every combination, that can be in a password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an attack vector in almost all modern public systems?

A

Authentication functions are always available and therefore always an attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some protection mechanisms for authentication functions?

A

Exponential backoff: Wait time is x^n-1 for each n attempts.

Disconnection after N attempts

Jailing: Disable the account after N unsuccessful attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the problems with using passwords?

A

Loss
Disclosure - either stolen or given
User - more passwords needed but same used across many sites.
Revocation - Disclosure of password to admin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the hazard points of physical password entry?

A

Shoulder surfing

Interception of transmissions over the network

Keyboards can be adapted

Door entry pins etc have erosion and grease marks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can the storage of passwords be protected?

A

Encrypt password file

Store one-way hash of the password

17
Q

What are the attacks on password systems?

A

Brute force attack

Dictionary attack

18
Q

What is a brute force attack on passwords?

A

A brute force attack is an attack that uses repeated trial and error with a random password generator.

19
Q

What is a dictionary attack on passwords?

A

Common word list or word seed function is used to test common words for the password.

20
Q

What are the possible defences against password attacks?

A

Allowing finite login attempts

Insisting on rules such as seeding or increasing the password space by requiring numbers, special characters etc.

21
Q

Why does increasing the password length and not allowing common passwords improve security?

A

Takes more time to guess as the password space increases

22
Q

What do users tend to make password choices on?

A
Username
Real name
Computer name
Dictionary words
Reversed dictionary words
23
Q

What is a challenge-response?

A

A challenge-response protects users if an attack has taken place by changing the input required to authenticate each time to confirm identity.

Challenge-response is coupled with the user’s password and hashed, then compared at the server side to authenticate.

24
Q

What is password entropy?

A

The size of the password space. The higher the entropy, the harder it is to crack the password.