Week 3 Flashcards
Name 3 Password Strategies
- User education
- Computer generated passwords
- Reactive password checking
Name 3 ways that Proactive password checking can be implemented
1_ Rule enforcement
2_ Password checker
3_ Bloom filter
Name 3 types of cards used as tokens
1- Embossed
2- Memory cards
3- Smart
Give an example of what memory cards are used for
Hotel room
Name 3 characteristics that are true of smart tokens
- Include an embedded microprocessor
- Contact and contact less interfaces
- Require some user interface
Name 3 electronic functions for eID cards
- ePass
- eID
- eSign
What is Password Authenticated Connection Establishment (PACE)?
Ensures that the contactless
RF chip in the eID card cannot be read without explicit access control.
What is biometric authentication?
Attempts to authenticate based on physical characteristics
Why is remote user authentication more complex?
More susceptible to eavesdropping or capturing a password.
Name 3 authentication security issues
- Denial-of-service
- Eavesdropping
- Trojan Horse