User Authentication Flashcards
Presenting an identifier to the security system
Identification step
Presenting or generating authentication information that corroborates the binding between the entity and the identifier
Verification step
What are the four means of authenticating user identity based on?
Something the individual knows
Something the individual possess (token)
Something the individual is (static biometrics)
Something the individual does (dynamic biometrics)
What is an example of something the individual knows?
Password, PIN, answers to prearranged questions
What is an example of something the individual possess?
Smartcard, electronic keycard, physical key
What is an example of something the individual is (static biometrics)?
Fingerprint, retina, face
What is an example of something the individual does (dynamic biometrics)?
Voice pattern, handwriting, typing rhythm
What are password vulnerabilities?
Offline dictionary attack Specific account attack Popular password attack Password guessing against single user Workstation hijacking Exploiting user mistakes Exploiting multiple password use Electronic monitoring
In the UNIX Hashed password scheme is the password saved on the machine?
no, only the user ID, salt value, and hash code.
True or False
Unix Hashed Password adequate or inadequate?
Now regarded as inadequate, still often required for compatibility with existing account management software or multivendor environments.
What are the improvements implementations for the Unix Hashed Password Scheme?
Much stronger hash/salt schemes available for Unix
Recommended has function is based on MD5
OpenBSD uses Blowfish block cipher based hash algorithm call Bcrypt
What are examples of password cracking?
Dictionary attacks
Rainbow table attacks
John the ripper
What are the differences in memory card and smart card
Memory cards store but do not process data Smart Card Appearance of a credit card Has an electronic interface Has an entire microprocessor Processor Memory I/O ports
What does EEPROM stand for?
Electrically erasable programmable ROM
-Holds application data and programs on a smart card
What are the two steps in an authetication process?
Identification step
Verification step
Presenting an identifier to the security system
Identification step in the authentication process
Presenting or generating authentication information that corroborates the binding between the entity and the identifier
Verification step in the authentication process
_______ is the means by which a user provides a claimed identity to the system.
Identification
_______ _____ ______ is the process of establishing confidence in user identities that are presented electronically to an information system.
Electronic user authentication
An _______ _____ describes an organizations degree of certainty that a user has presented a credential that refers to his or her identity.
assurance level
What are the four levels of assurance and there levels of confidence?
Level 1: little or no confidence
Level 2: Some confidence
Level 3: High confidence
Level 4: Very high confidence
An authentication error could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.
Low Potential Impact
An authentication error could be expected to have a serious adverse effect.
Moderate Potential Impact
An authentication error coulee be expected to have a severe or catastrophic adverse effect.
High Potential Impact
How does an ID provide security?
- It determines whether the user is authorized to gain access to a system.
- Determines the privileges accorded to the user.
- Is used in what is referred to as discretionary access control
The attacker obtains the system password file and compares the password hashes against hashes of commonly used passwords.
Offline dictionary attack
The attacker targets a specific account and submits password guesses until the correct password is discovered.
Specific account attack
A variation of the preceding attack is to use a popular password and try it against a wide range of user IDs.
Popular password attack
The attacker attempts to gain knowledge about the account holder and system password policies and uses that knowledge to guess the password.
Password guessing against single user