CH3 User Authentication and Security Principles

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Digital User Authentication

Establishing confidence in electronically presented identities.

2
New cards

Identification Step

Presenting an identifier to the security system.

3
New cards

Verification Step

Corroborating identity with authentication information.

4
New cards

Access Control

Regulating user permissions to resources.

5
New cards

User Accountability

Tracking user actions for security purposes.

6
New cards

Authentication Scenarios

Examples include logging into computers and websites.

7
New cards

Client-Server Vulnerabilities

Risks during client authentication to server.

8
New cards

Authentication Token

Something the individual possesses for authentication.

9
New cards

Static Biometrics

Physical traits like fingerprints for identity verification.

10
New cards

Dynamic Biometrics

Behavioral traits like voice patterns for identity verification.

11
New cards

Multifactor Authentication

Using multiple methods for user verification.

12
New cards

Assurance Level

Degree of certainty in user identity verification.

13
New cards

FIPS 199

Defines potential impact levels of security breaches.

14
New cards

Password-Based Authentication

User provides login and password for access.

15
New cards

Password Vulnerabilities

Weaknesses that can be exploited to breach security.

16
New cards

Countermeasures

Controls to prevent unauthorized access to passwords.

17
New cards

UNIX Password Storage

Old system stored hashed passwords in /etc/passwd.

18
New cards

Salt

Random data added to passwords before hashing.

19
New cards

Hash Function

Transforms input into a fixed-size string of characters.

20
New cards

Brute Force Attack

Trying all possible combinations to crack passwords.

21
New cards

Dictionary Attack

Using a list of common passwords to gain access.

22
New cards

Rainbow Table Attack

Using pre-computed hash tables to crack passwords.

23
New cards

Keystroke Logging

Recording keystrokes to capture passwords.

24
New cards

Intrusion Detection

Monitoring for unauthorized access attempts.

25
New cards

Account Lockout Mechanism

Prevents access after multiple failed login attempts.

26
New cards

Bcrypt

Secure hashing algorithm using Blowfish for passwords.

27
New cards

Complex password policy

Requires users to create stronger passwords.

28
New cards

Password-cracking techniques

Methods to guess or break passwords.

29
New cards

Password File Access Control

Prevents offline attacks by restricting access.

30
New cards

Shadow password file

Hidden file storing user passwords securely.

31
New cards

Vulnerabilities

Weaknesses in OS allowing unauthorized access.

32
New cards

Reactive password checking

System checks passwords against its own cracker.

33
New cards

Proactive Password Checking

Enforces rules to strengthen password security.

34
New cards

Bloom filter

Data structure for efficient password checking.

35
New cards

TOKEN-BASED AUTHENTICATION

Uses physical tokens for user authentication.

36
New cards

Smart Tokens

Tokens with embedded microprocessors for security.

37
New cards

Smart Cards

Credit card-like tokens with processing capabilities.

38
New cards

Electronic Identity Cards (eID)

Smart cards serving as national identity cards.

39
New cards

Biometric Authentication

Uses unique physical traits for user verification.

40
New cards

False Match

Different biometric data incorrectly identified as same.

41
New cards

False Non-Match

Same biometric data incorrectly identified as different.

42
New cards

Remote User Authentication

Authentication over networks with additional security threats.

43
New cards

Eavesdropping

Listening to capture passwords during transmission.

44
New cards

Replay Attack

Reusing captured authentication sequences to gain access.

45
New cards

Trojan Horse

Malicious software masquerading as legitimate applications.

46
New cards

Denial-of-Service Attack

Flooding service with requests to disable it.

47
New cards

Client Attack

Attacks targeting user authentication processes.

48
New cards

Host Attack

Attacks directed at the host's user files.

49
New cards

Biometric Sensor

Device capturing biometric data for authentication.

50
New cards

Matching Score

Numeric value comparing biometric data for verification.

51
New cards

Authentication Protocol

Rules governing the authentication process.

52
New cards

Dynamic Password Generator

Creates temporary passwords for secure access.

53
New cards

Challenge-Response Protocol

Authentication method using prompts and responses.

54
New cards

User Education

Teaching users about strong password practices.

55
New cards

Password Selection Strategies

Guidelines for users to create secure passwords.

56
New cards

Computer Generated Passwords

Automatically created passwords often hard to remember.

57
New cards

Accident with Permissions

Unintentional exposure of sensitive files.

58
New cards

Sniffing

Capturing passwords from network traffic.