Access Control and Authentication Quiz - Week 4

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary concern when using biometrics in systems?

  • Privacy concerns over storing sensitive data (correct)
  • Cost of hardware
  • Speed of data processing
  • User interface design

Authorization is the same as identification in security systems.

False (B)

What does the Principle of Least Privilege entail?

Users should only be given the minimum access necessary to perform their job.

Vertical escalation involves gaining access to a ________ privilege account.

<p>higher</p> Signup and view all the answers

Match the following access control terms with their definitions:

<p>Authorization = Permission to perform a task Privilege Escalation = Gaining unauthorized access to higher-level account Reference Monitor = Checks user authorization for resources Basic Access Modes = Types of actions that can be performed on an object</p> Signup and view all the answers

What are the three stages involved in access control?

<p>Identification, Authentication, Authorization (B)</p> Signup and view all the answers

Multifactor Authentication (MFA) enhances security but does not affect usability.

<p>False (B)</p> Signup and view all the answers

What is a method used to protect passwords during storage?

<p>Hashing</p> Signup and view all the answers

A long pseudo-random string added to a password before hashing is known as a ______.

<p>salt</p> Signup and view all the answers

Which of the following is NOT a challenge in password security?

<p>Password hashing (D)</p> Signup and view all the answers

Match the following biometrics with their types:

<p>Facial identification = Physical biometrics Typing patterns = Behavioural biometrics Fingerprint recognition = Physical biometrics Voice recognition = Behavioural biometrics</p> Signup and view all the answers

Liveliness detection aims to confirm that a biometric sample comes from a live person.

<p>True (A)</p> Signup and view all the answers

Name one type of attack aimed at compromising password security.

<p>Brute force attack</p> Signup and view all the answers

Which of the following is NOT a concern related to biometric systems?

<p>Increased speed of verification (C)</p> Signup and view all the answers

Authorization and authentication are the same concepts in security systems.

<p>False (B)</p> Signup and view all the answers

What does the Principle of Least Privilege aim to achieve?

<p>Limit user access to the minimum necessary for their job</p> Signup and view all the answers

In a traditional access control model, the __________ monitors and checks if the user has the correct authorization.

<p>reference monitor</p> Signup and view all the answers

Match the following types of privilege escalation with their descriptions:

<p>Vertical escalation = Gaining access to a higher privilege account Horizontal escalation = Accessing similar functions but different data</p> Signup and view all the answers

Which of the following factors is NOT considered in authentication?

<p>Something you see (D)</p> Signup and view all the answers

Multifactor Authentication is used primarily for easing usability.

<p>False (B)</p> Signup and view all the answers

What is the purpose of a salt in password security?

<p>To make password hashes unique and protect against attacks.</p> Signup and view all the answers

___ are examples of biometric identification methods.

<p>Facial identification and fingerprint recognition</p> Signup and view all the answers

Which modeling technique helps in estimating the difficulty of guessing passwords?

<p>Shannon's entropy (A)</p> Signup and view all the answers

Match the following types of biometrics with their characteristics:

<p>Fingerprint recognition = Physical biometrics Typing speed = Behavioral biometrics Facial identification = Physical biometrics Voice recognition = Behavioral biometrics</p> Signup and view all the answers

Name one type of attack that targets password security.

<p>Brute force attack or dictionary attack.</p> Signup and view all the answers

Behavioural biometrics include how a user interacts with their device.

<p>True (A)</p> Signup and view all the answers

Flashcards

Behavioral Biometrics

Using patterns in human behavior, like typing style, for identification.

Biometrics Privacy Concerns

Storing biometric data raises worries about security and misuse of personal information.

Biometric Capture Failure

Difficulty in capturing biometric data during registration or validation, reducing usability.

False Accept/Reject Rates

Balancing system accuracy with ease of use and cost in biometric systems.

Signup and view all the flashcards

Biometric Training Set Diversity

Ensuring that machine learning models in biometrics use data representing various groups to avoid biases.

Signup and view all the flashcards

Authorization

Determining if a user can perform a specific task after logging in.

Signup and view all the flashcards

Identification vs. Authentication vs. Authorization

Identification is who you are, authentication proves who you are, and authorization defines what you can do.

Signup and view all the flashcards

Lampson's Access Control Model

A model for access control that uses subjects, objects, requests, and a reference monitor.

Signup and view all the flashcards

Reference Monitor

The part of a system that checks if a user has permission to access a resource.

Signup and view all the flashcards

Least Privilege Principle

Giving users only the minimum access needed to do their job, reducing security risks.

Signup and view all the flashcards

Privilege Escalation

Gaining unauthorized higher permission.

Signup and view all the flashcards

Vertical Escalation

Gaining access to a higher privilege account.

Signup and view all the flashcards

Horizontal Escalation

Accessing data or functions meant for other users.

Signup and view all the flashcards

Access Control

A process with three stages: identification, authentication, and authorization to manage who accesses what

Signup and view all the flashcards

Identification

Claiming an identity; the first stage of access control

Signup and view all the flashcards

Authentication

Verifying an identity; the second stage of access control

Signup and view all the flashcards

Authorization

Checking permissions for accessing resources; the third stage of access control

Signup and view all the flashcards

Authentication Factors

Methods used to prove identity (something you know, have, or are)

Signup and view all the flashcards

Multifactor Authentication (MFA)

Using multiple authentication factors for enhanced security

Signup and view all the flashcards

Password Security

Creating, storing, and protecting passwords to resist attacks

Signup and view all the flashcards

Password Entropy

A measure of the difficulty of guessing a password

Signup and view all the flashcards

Password Hashing

Converting passwords into a one-way hash, protecting passwords in storage

Signup and view all the flashcards

Salts in Hashing

Random strings added to passwords before hashing to prevent identical password attacks.

Signup and view all the flashcards

Brute-Force Attack

Trying many passwords until achieving access

Signup and view all the flashcards

Dictionary Attack

Trying common passwords or words as potential access credentials.

Signup and view all the flashcards

Biometrics

Identify individuals based on measurable physical or behavioral characteristics.

Signup and view all the flashcards

Identification Mode (Biometrics)

Finding a user in a database using biometrics.

Signup and view all the flashcards

Verification Mode (Biometrics)

Verifying a user using biometrics.

Signup and view all the flashcards

Liveliness Detection

Ensuring biometric input is from a live person, not a forgery.

Signup and view all the flashcards

Vertical Privilege Escalation

Gaining access to a higher privilege account, like from a regular user to an administrator account, often with more control.

Signup and view all the flashcards

Horizontal Privilege Escalation

Accessing data or functions meant for different users with similar system privileges, like accessing another user's bank account without authorization.

Signup and view all the flashcards

Study Notes

Access Control

  • Involves three stages: identification, authentication, and authorization
  • Identification: claiming an identity
  • Authentication: proving identity
  • Authorization: checking permissions for specific actions or data

Authentication Factors

  • Something you know (e.g., passwords)
  • Something you have (e.g., access cards)
  • Something you are (e.g., biometrics)

Multifactor Authentication (MFA)

  • Uses two or more authentication factors for enhanced security
  • May impact usability

Password Security

  • Challenges balancing strength and memorability
  • Password strength is often measured by entropy
  • Common passwords skew entropy calculations
  • Shannon's entropy model helps estimate difficulty of guessing predictable passwords

Password Storage

  • Uses hashing and salts to protect passwords
  • Salt: a long, pseudo-random string prepended or appended to a password before hashing
  • This prevents direct storage of plain text passwords
  • Different passwords, even with the same value, result in different hashed values due to the inclusion of a salt

Password Attacks

  • Brute-force attacks
  • Dictionary attacks
  • Pre-computed hash table attacks

Password Guidance

  • Use three random words for memorable and strong passwords

Biometrics

  • Physical biometrics: facial identification, fingerprint recognition
  • Behavioural biometrics: how a user types
  • Identification Mode: Using biometrics to find a user in a database

Verification Mode

  • User matches with a stored template of biometric recognition

Fingerprint Biometrics Limitations

  • Fingerprints can change due to cuts or damage
  • Wet or faked fingerprints can cause issues
  • Fingerprints can be lifted from surfaces

Biometric Concerns

  • Privacy concerns over storing sensitive biometric data
  • Failure to capture biometrics during enrollment or verification
  • Balancing false accept and false reject rates with system usability and cost
  • Concerns about diversity in machine learning training sets for biometrics

Access Control Model

  • Four entities: subject (user/process), access request, object (resource), reference monitor

Least Privilege Principle

  • Users should only have the minimum necessary access to perform their job
  • Reduces risk of information disclosure and privilege escalation

Privilege Escalation Attacks

  • Vertical escalation: gaining access to a higher privilege account
  • Horizontal escalation: accessing similar functions with different data (e.g., another user's account)
  • Often performed through password guessing or SQL injection

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser