Chapter 3 - User Authentication (Computer Security: Principles and Practice)

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

T

User authentication is the fundamental building block and the primary line of defense.

2
New cards

F

Identification is the means of establishing the validity of a claimed identity provided by a user.

3
New cards

T

Many users choose a password that is too short or too easy to guess.

4
New cards

T

User authentication is the basis for most types of access control and for user accountability.

5
New cards

F

Memory cards store and process data.

6
New cards

T

Enrollment creates an association between a user and the user's biometric characteristics.

7
New cards

T

In a biometric scheme some physical characteristic of the individual is mapped into a digital representation.

8
New cards

password cracker

A __________ is a password guessing program.

9
New cards

reactive password checking

A __________ strategy is one in which the system periodically runs its own password cracker to find guessable passwords.

10
New cards

facial characteristics

The most common means of human-to-human identification are __________.

11
New cards

Hand geometry

__________ systems identify features of the hand, including shape, and lengths and widths of fingers.

12
New cards

enrolled

Each individual who is to be included in the database of authorized users must first be __________ in the system.

13
New cards

host attack

A __________ is directed at the user file at the host where passwords, token passcodes, or biometric templates are stored.

14
New cards

replay

A __________ attack involves an adversary repeating a previously captured user response.

15
New cards

Identification

An authentication process consists of the _________ step and the verification step.

16
New cards

tokens

Objects that a user possesses for the purpose of user authentication are called ________

17
New cards

Biometric

A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics.

18
New cards

denial-of-service

A _________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.