W9: Flashcards

1
Q

Credentials:

A

Identification

Association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication:

A

Verifying the identity implies valid association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization is…

A

giving someone permission to do or to access something

ex. access to a system/network, a directory/folder, to read and/or write a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“least privilege” principle:

A

grant only the minimum authority needed

Where high level authority is needed, e.g. to reset a password, wrap it inside a program/script which inherits the needed authority but restricts action and effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Minimum THREE UserIDs:

A
  • one for development system (all authorities)
  • one for production server (read only authority)
  • one used only for admin and security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is authorization?

4 points

A

Permission = access rights = authorization
Windows: object, right click, select Properties, click on Security tab
*nix: chmod command
OS security controls the ability of users to view, change, navigate, and execute the contents of a file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Browser security:

A

HTTPS needed for sign on
Domain Validation (DV) certificate
DNS privacy security, block malware, botnets, malicious domains
EFF’s Privacy Badger blocks inivisible trackers
EFF’S Panopticlick online tracking test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the most common methods of cracking?

A

Social engineering, weak paswords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering

A

You are your own security hole by posting your life on the internet
Spear Phishing has 35% success rate
Social media makes it easier to guess credentials, answer security questions, pretend to be you when calling the help-desk, and perform identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Weak passwords

A
Weak passwords are not unique
Commonly used and/or reused
25 passwords used in 10% accounts
10,000 passwords used by 30% users
Humans do not create random values: brute-force cracking is unnecessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Forget/Recover your password

A

“I forgot my password” relies on the strength of your email account’s security and its password
Security questions recovery: not recommended
- Easy to hack by Googling you and reading social media
Security Questions Defence:
Use diceware phrase regardless of security question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bad password rules:

A

Length: min-max -> both too short
Strength: alphA + digits + 5?#80!$ (symbols) -> too cryptic
Not in dictionary -> too cryptic
Expiry: periodic change -> too often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password defense

A

long length bets cryptic strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password managers

A

unique, long, strong, random char passwords, per account
Must remember one loss passphrase

ex. 1Password, LastPass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Diceware Passphrase

A

long memorable password of random words
Generates a 5 digit random number using dice. Look up the word on the list. Do it six times. Good for password managers and security questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Third party authentication:

A

Not recommended to use your google/facebook account.

Site will ask for access to accounts. Read authorization permission requested

17
Q

2FA

A

Two factor Authentication
used to verify password sign on and guard against phishing and cracking
1. Something I know (user id, password, pin)
2. Something I have (phone, bank access card)

18
Q

PIN stands for

A

Probably Insecure Number
4 digit pin = 10,000 posibilities
dates are commonly used

19
Q

3FA

A

Three Factor Authentication
Most secure and most expensive

  1. Something I know (id, password, pin)
  2. Something I have (phone, dongle, bank/credit/access card)
  3. Something I am (iris scan, fingerprint, face)
20
Q

Better password policies

A

User ID: not email address or user’s name
Passphrase is 14-64 characters in length
No complexity rules: allow all characters including space

21
Q

Better password policies
Storage:
Just say no:

A

Storage: In a salted and hashed format using a standard library with Argon2id or Scrypt

Just say no to passwords:
Web Authentication API
Authenticator device/phone app + fingerprint

22
Q

Security Approaches

A

Authentication: 2FA minimum
Authorization: Least Privilege principle
Systems: Zero trust architecture

23
Q

Weak password stats:

A

25 passwords used in 10% accounts

10,000 passwords used by 30% users