CS 2550 Foundations of Cybersecurity: Passwords and Authentication

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary and concepts related to the foundations of cybersecurity, specifically focusing on passwords and authentication. They include definitions, examples, and essential terms that help in understanding the material for the CS 2550 course.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Authentication

The process of verifying an actor’s identity.

2
New cards

Username

The unique identifier for a user in a system.

3
New cards

Secret

A piece of information used to confirm an actor's identity, typically a password.

4
New cards

What are the three classes of secrets in authentication?

  1. Something you know (e.g., a password), 2. Something you have (e.g., a smart card), 3. Something you are (e.g., a fingerprint).
5
New cards

Hashing

A method of transforming input data into a fixed-size string of characters, typically for security purposes.

6
New cards

Salting

Adding random data to passwords before hashing to ensure that identical passwords have different hashes.

7
New cards

Key Stretching

The technique of making the hashing process slower to mitigate brute-force attacks.

8
New cards

Honeywords

Fictitious passwords stored alongside the real password to detect unauthorized access.

9
New cards

Dictionary Attack

An attack that uses a prearranged list of likely passwords to gain unauthorized access.

10
New cards

What should passwords never be stored as?

Plain text.

11
New cards

Collision Resistance

A property of cryptographic hash functions that ensures it's difficult to find two different inputs that produce the same hash.

12
New cards

Entropy

A measure of randomness or unpredictability in a password.

13
New cards

Password Recovery

The process of resetting a password for a user who has forgotten it.

14
New cards

Knowledge Based Authentication (KBA)

A method of resetting passwords that relies on answering personal knowledge questions.

15
New cards

Account-based Reset

A method of password recovery that sends a verification code to the user's contact address.

16
New cards

Brute-force Attack

An attack method that involves systematically trying every possible password combination.

17
New cards

What is a common issue with knowledge-based authentication (KBA)?

The information required is often publicly available or easily obtainable.

18
New cards

Pluggable Authentication Modules (PAM)

A framework used by Unix-based systems for user authentication.

19
New cards

What is the function of a Ticket Granting Server (TGS) in Kerberos?

To issue tickets for user authentication to services on the network.

20
New cards

What is a significant vulnerability of SMS-based two-factor authentication?

It's susceptible to social engineering attacks.

21
New cards

Cryptographic Hash Function Examples

MD5, SHA1, SHA256, SHA512.

22
New cards

What is the purpose of a hardware token in two-factor authentication?

To securely store cryptographic keys and provide a second authentication factor.

23
New cards

UGly GPrevious बसन अनल एक

The theoretical attack where cryptographic systems may be broken.

24
New cards

What is recommended for password management?

Use a password manager to keep track of different passwords securely.

25
New cards

Time-based One-time Password (TOTP)

A temporary password that changes after a specific time interval.

26
New cards

Universal 2nd Factor (U2F)

A security protocol that uses a physical hardware device to provide two-factor authentication.

27
New cards

Factors for password strength

Length, complexity, and unpredictability of the password.

28
New cards

NIS (Network Information Service)

A protocol that provides a centralized directory service for user information.

29
New cards

Replay Attack

An attack where an adversary captures a valid data transmission and retransmits it.

30
New cards

What is the role of a centralized authentication server in a distributed authentication system?

To manage and authenticate user credentials across multiple services.

31
New cards

Should passwords be shared across different services?

No, password reuse can lead to compromised security if one service is breached.

32
New cards

What is the principle behind honeywords?

To alert system administrators if an incorrect password variant is used during login.

33
New cards

Biometrics

Authentication methods based on physical or behavioral characteristics of the user.