Sammanfattad tenta Flashcards
What are the two steps in authentication?
Identification (announcing who you are) and Authentication (proving who you are).
What are the four means of user authentication?
1) Something you know (e.g., password), 2) Something you possess (e.g., token), 3) Something you are (e.g., biometric), 4) Something you do (e.g., behavior-based).
What is multi-factor authentication (MFA)?
A method that combines two or more authentication factors to verify identity.
What role does a username/login ID play in password authentication?
It determines the user’s authorization and privileges in the system.
What role does a password play in password authentication?
It confirms the user’s identity and establishes trust for access.
What is a hash function?
A one-way function that’s easy to compute but hard to reverse.
Why is a salt added to a password before hashing?
To ensure unique hashes even for identical passwords, preventing rainbow table attacks.
What is a rainbow table?
A precomputed table for reversing cryptographic hash functions, used in password cracking.
What are the three main password cracking strategies?
Exhaustive search (brute force), intelligent search (e.g., dictionary attack), and using dedicated cracking servers.
What is a password spoofing attack?
An attack where a fake interface captures user credentials.
What is shoulder surfing?
Observing a user enter a password over their shoulder.
What is a key logger?
Software or hardware that records keystrokes.
What is proactive password checking?
Enforcing rules or using dictionaries to prevent weak passwords.
What is a Bloom filter used for in password checking?
To efficiently check if a password exists in a blacklist of weak passwords.
What are memory cards used for in authentication?
They store data and are used alone or with a PIN for access.
What is a smart card?
A card with an embedded microprocessor used for authentication.
What are the three types of memory in smart cards?
ROM, EEPROM, and RAM.
What are the smart card authentication protocols?
Static, dynamic password generation, and challenge-response.
What is biometric authentication?
Authentication based on unique physical characteristics.
What are the two types of biometric matching?
Verification (1:1 comparison) and Identification (1:n comparison).
What is the Equal Error Rate (EER)?
The point where False Match Rate (FMR) and False Non-Match Rate (FNMR) are equal.
What is FMR in biometric systems?
False Match Rate – the rate at which unauthorized users are incorrectly accepted.
What is FNMR in biometric systems?
False Non-Match Rate – the rate at which legitimate users are incorrectly rejected.
What is challenge-response protocol?
A method where the system issues a challenge that the user must respond to correctly.