Term
Basic Authentication Credentials Include.. |
|
Definition
Where you are What you have What you are What you know What you do |
|
|
Term
What is the most common form of authentication? |
|
Definition
|
|
Term
Are passwords a strong form of authentication? |
|
Definition
|
|
Term
What are some weaknesses of passwords? |
|
Definition
Humans have trouble memorizing good passwords, especially when you need multiple passwords and your passwords are temporary. |
|
|
Term
Common Attacks Passwords include the following..... |
|
Definition
Social Engineering, Capturing, Resetting, Offline Attacks |
|
|
Term
|
Definition
Attacker steals files of password digests and compare with their own digests they have created. |
|
|
Term
|
Definition
Brute Force Mask Rule Dictionary Rainbow table Password Collections |
|
|
Term
|
Definition
Offline Attack methodology that applies rules to the password being brute forced, in order to more effectively discover passwords. |
|
|
Term
NTLM (New Technology LAN Manager) Hash Attack |
|
Definition
An attacker can steal the digest of an NTLM password and simply pretend to be the user and send that hash to the remote system to be authenticated. |
|
|
Term
|
Definition
Attacker creates digests of common dictionary words and compares against stolen digest file. |
|
|
Term
|
Definition
Dictionary attack that uses a set of dictionary words and compares it to stolen digest. |
|
|
Term
|
Definition
the search for any two digests that are the same |
|
|
Term
|
Definition
Conducts a statistical analysis on the stolen passwords that is used to create a mask to break the largest number of passwords |
|
|
Term
|
Definition
Creates a large pregenerated data set of candidate digests. |
|
|
Term
|
Definition
Can be used repeatedly
Faster than dictionary attacks
Less memory needed on an attacking machine |
|
|
Term
|
Definition
A collection of real passwords that can be used to work on other attacks. |
|
|
Term
|
Definition
Properly manage them as a user and protect the digest as the enterprise. |
|
|
Term
|
Definition
Password generators, online vaults and password management applications. |
|
|
Term
Methods to protect password digests |
|
Definition
Use Salts, Key Stretching |
|
|
Term
|
Definition
Adds a random string that is used in hash algorithms in order to protect password digests |
|
|
Term
|
Definition
Using a hashing algorithm that is designed to be slow in order to protect password digests. |
|
|
Term
Examples of Key Stretching Algorithms |
|
Definition
|
|
Term
Multifactor Authentication |
|
Definition
When a user is required to provide multiple forms of authentication. |
|
|
Term
|
Definition
Used to create one time passwords, which is an authentication code that can be used only once for a limited period of time. |
|
|
Term
|
Definition
Token stored on a small device with a window display. |
|
|
Term
|
Definition
Token stored on a general-purpose device like a laptop computer or smartphone |
|
|
Term
|
Definition
HOTP
User only gets one chance at one time to enter their password. |
|
|
Term
|
Definition
Contains integrated circuit chip that holds information can can either be a contact or contactless card. |
|
|
Term
|
Definition
Issued by the DOD, Bar code, magnetic strip, and bearer’s picture. |
|
|
Term
What common mobile device is starting to replace Smart Cards? |
|
Definition
|
|
Term
|
Definition
A person's unique physical characteristics. |
|
|
Term
Dynamic Fingerprint Scanner |
|
Definition
Uses a small slit or opening in which you slide your finger in |
|
|
Term
Static Fingerprint Scanner |
|
Definition
Takes a picture of your fingerprint and compares it to an image of your fingerprint. |
|
|
Term
|
Definition
Cost of hardware, amount of error, etc. |
|
|
Term
|
Definition
Relates to perception, thought process, and understanding of the user. |
|
|
Term
Example of Cognitive Biometrics |
|
Definition
-Picture Password (Select 10 points of interest on a picture)
-Requires user to identify specific faces
-Requires user to select one of many memorable events |
|
|
Term
|
Definition
Authenticates by normal actions the user performs. |
|
|
Term
|
Definition
Promise to reduce the burden of usernames and passwords by using one single account. |
|
|
Term
|
Definition
|
|
Term
Microsoft User Account Management |
|
Definition
Password Policy Settings Account Lockout Policy |
|
|
Term
|
Definition
When a new domain is created, it shares resources with its parent domain by default.
Can enable an authenticated user to access resources in both the child and the parent. |
|
|