Multifactor Authentication vocab

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

SFA (Single Factor Authentication)

using only one authentication method to verify identity

2
New cards

OTP (One-time password)

a temporary password valid for a single login session or transaction

3
New cards

TOTP (Time-based one-time password)

An OTP generated based on time synchronization between a server and device

4
New cards

Hash-based Message Authentication Code (HMAC)-based one-time password (HOTP)

An OTP generated using a counter-based algorithm

5
New cards

Token

a physical or digital object used to authenticate identity

6
New cards

Soft Token

digital authentication token usually generated by an app

7
New cards

Hard token

a physical device such as a key fob or USB security key

8
New cards

SMS authentication

receiving OTPS via text message (vulnerable to SIM swapping)

9
New cards

SIM swapping

a cyberattack where a criminal transfers a victim’s phone number to another SIM card to intercept SMS codes

10
New cards

SSO (Single sign-on)

a system that allows user to log in once and gain access to multiple resources without re-authenticating

11
New cards

MITM (Man-in-the-middle) attack

An attack where a hacker intercepts communication between two parties to steal authentication data

12
New cards

IAM (Identity and access management)

framework of policies and technologies to ensure the right users have the right access

13
New cards

FIDO2 (Fast Identity Online 2)

an open standard for strong authentication, passwordless authentication using hardware tokens

14
New cards

U2F (Universal 2nd Factor)

older authentication standard that provides strong second factor using physical security key and public-key cryptography

15
New cards

Adaptive Authentication (risk-based authentication)

Adjusting authentication requirements based on context, such as location or device risk

16
New cards

Phishing

deceptive attempt to steal sensitive data