Authentication

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

A set of flashcards covering key concepts from the Authentication lecture in Cybersecurity Fundamentals.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

16 Terms

1
New cards

Authentication

The process of verifying the identity of a person or device.

2
New cards

Password Spraying

An attack method where a list of commonly used passwords is tried against many accounts.

3
New cards

Credential Stuffing

Using a username/password combo obtained from one breach to attempt access on different accounts.

4
New cards

Biometrics

Authentication based on biological characteristics such as fingerprints or facial recognition.

5
New cards

ASCII Characters

Standard characters representing letters, digits, and punctuation in text data.

6
New cards

NIST Guidelines

Standards recommended by the National Institute of Standards and Technology for password security.

7
New cards

Leet Speak

An alternative alphabet used primarily on the internet, replacing letters with similar-looking numbers or symbols.

8
New cards

Entropic Passwords

Passwords designed to have high entropy, making them difficult to guess.

9
New cards

Passkeys

Cryptographic credentials stored on a device that replace traditional passwords and enhance security.

10
New cards

Authorization

The process of determining if an authenticated user has permission to access a resource.

11
New cards

Multi-Factor Authentication (MFA)

An authentication method requiring the use of two or more verification factors.

12
New cards

Knowledge Factor

An authentication factor based on something the user knows, such as a password or PIN.

13
New cards

Possession Factor

An authentication factor based on something the user has, such as a smart card or security token.

14
New cards

Inherence Factor

An authentication factor based on something the user is, typically using biometrics.

15
New cards

Hashing

The process of transforming data into a fixed-size string of characters, typically used to securely store passwords.

16
New cards

Brute-Force Attack

An attack method that attempts to guess credentials by trying every possible combination of characters until the correct one is found.