Chapter 3 - User Authentication (Computer Security: Principles and Practice, 2nd Edition)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

something the individual knows, possesses (token), is (static biometrics), or does (dynamic biometrics)

4 means of user authentication

A __________ authentication system attempts to authenticate an individual based on his or her unique physical characteristics

Biometric

The technique for developing an effective and efficient proactive password checker based on rejecting words on a list is based on the use of a __________ filter

Bloom

A __________ is an individual to whom a debit card is issued.

Cardholder

Authentication protocols used with smart tokens can be classified into three categories: static, dynamic password generator, and ___________

Challenge-Response

A __________ attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

Denial-Of-Service

Voice pattern, handwriting characteristics, and typing rhythm are examples of __________ biometrics

Dynamic

__________, in the context of passwords, refers to an adversary's attempt to learn the password by observing the user, finding a written copy of the password, or some similar attack that involves the physical proximity of user and adversary.

Eavesdropping

directed at user file at the host where passwords, token passcodes, or biometric templates are stored

Host attacks (authentication issue)

An authentication process consists of the ________ step and the verification step.

Identification

A host generated random number is often called a __________.

Nonce

denying access to encrypted passwords with a shadow password file

Prevent offline dictionary attack by

With the __________ strategy a user is allowed to select their own password, but the system checks to see if the password is allowable

Proactive Password Checking

adversary repeats a previously captured user response

Replay (Authentication issue)

The __________ is the pattern formed by veins beneath the retinal surface.

Retinal Pattern

A __________ is a separate file from the user IDs where hashed passwords are kept

Shadow Password File

Objects that a user possesses for the purpose of user authentication are called ______

Tokens

In a __________ attack, an application or physical device masquerades as an authentic application or device for the purpose of capturing a user password, passcode, or biometric

Trojan horse

The process of verifying an identity claimed by or for a system entity.

User Authentication (RFC 2828 definition)

The __________ step is presenting or generating authentication information that corroborates the binding between the entity and the identifier

Verification

automatic workstation logout

countermeasure to workstation hijacking

password cracker, rule enforcement, bloom filter

proactive password checking


Set pelajaran terkait

Chapter 14: Basic Elements of Individual Behavior in Organizations

View Set

Life Skills-Reproduction Unit Test

View Set

3- Unit 8 Trading Securities Practice

View Set

Business Law and Ethics Test 3 Chapter 14

View Set