Podcast
Questions and Answers
What is a primary concern when using biometrics in systems?
What is a primary concern when using biometrics in systems?
- Privacy concerns over storing sensitive data (correct)
- Cost of hardware
- Speed of data processing
- User interface design
Authorization is the same as identification in security systems.
Authorization is the same as identification in security systems.
False (B)
What does the Principle of Least Privilege entail?
What does the Principle of Least Privilege entail?
Users should only be given the minimum access necessary to perform their job.
Vertical escalation involves gaining access to a ________ privilege account.
Vertical escalation involves gaining access to a ________ privilege account.
Match the following access control terms with their definitions:
Match the following access control terms with their definitions:
What are the three stages involved in access control?
What are the three stages involved in access control?
Multifactor Authentication (MFA) enhances security but does not affect usability.
Multifactor Authentication (MFA) enhances security but does not affect usability.
What is a method used to protect passwords during storage?
What is a method used to protect passwords during storage?
A long pseudo-random string added to a password before hashing is known as a ______.
A long pseudo-random string added to a password before hashing is known as a ______.
Which of the following is NOT a challenge in password security?
Which of the following is NOT a challenge in password security?
Match the following biometrics with their types:
Match the following biometrics with their types:
Liveliness detection aims to confirm that a biometric sample comes from a live person.
Liveliness detection aims to confirm that a biometric sample comes from a live person.
Name one type of attack aimed at compromising password security.
Name one type of attack aimed at compromising password security.
Which of the following is NOT a concern related to biometric systems?
Which of the following is NOT a concern related to biometric systems?
Authorization and authentication are the same concepts in security systems.
Authorization and authentication are the same concepts in security systems.
What does the Principle of Least Privilege aim to achieve?
What does the Principle of Least Privilege aim to achieve?
In a traditional access control model, the __________ monitors and checks if the user has the correct authorization.
In a traditional access control model, the __________ monitors and checks if the user has the correct authorization.
Match the following types of privilege escalation with their descriptions:
Match the following types of privilege escalation with their descriptions:
Which of the following factors is NOT considered in authentication?
Which of the following factors is NOT considered in authentication?
Multifactor Authentication is used primarily for easing usability.
Multifactor Authentication is used primarily for easing usability.
What is the purpose of a salt in password security?
What is the purpose of a salt in password security?
___ are examples of biometric identification methods.
___ are examples of biometric identification methods.
Which modeling technique helps in estimating the difficulty of guessing passwords?
Which modeling technique helps in estimating the difficulty of guessing passwords?
Match the following types of biometrics with their characteristics:
Match the following types of biometrics with their characteristics:
Name one type of attack that targets password security.
Name one type of attack that targets password security.
Behavioural biometrics include how a user interacts with their device.
Behavioural biometrics include how a user interacts with their device.
Flashcards
Behavioral Biometrics
Behavioral Biometrics
Using patterns in human behavior, like typing style, for identification.
Biometrics Privacy Concerns
Biometrics Privacy Concerns
Storing biometric data raises worries about security and misuse of personal information.
Biometric Capture Failure
Biometric Capture Failure
Difficulty in capturing biometric data during registration or validation, reducing usability.
False Accept/Reject Rates
False Accept/Reject Rates
Signup and view all the flashcards
Biometric Training Set Diversity
Biometric Training Set Diversity
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
Identification vs. Authentication vs. Authorization
Identification vs. Authentication vs. Authorization
Signup and view all the flashcards
Lampson's Access Control Model
Lampson's Access Control Model
Signup and view all the flashcards
Reference Monitor
Reference Monitor
Signup and view all the flashcards
Least Privilege Principle
Least Privilege Principle
Signup and view all the flashcards
Privilege Escalation
Privilege Escalation
Signup and view all the flashcards
Vertical Escalation
Vertical Escalation
Signup and view all the flashcards
Horizontal Escalation
Horizontal Escalation
Signup and view all the flashcards
Access Control
Access Control
Signup and view all the flashcards
Identification
Identification
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Authorization
Authorization
Signup and view all the flashcards
Authentication Factors
Authentication Factors
Signup and view all the flashcards
Multifactor Authentication (MFA)
Multifactor Authentication (MFA)
Signup and view all the flashcards
Password Security
Password Security
Signup and view all the flashcards
Password Entropy
Password Entropy
Signup and view all the flashcards
Password Hashing
Password Hashing
Signup and view all the flashcards
Salts in Hashing
Salts in Hashing
Signup and view all the flashcards
Brute-Force Attack
Brute-Force Attack
Signup and view all the flashcards
Dictionary Attack
Dictionary Attack
Signup and view all the flashcards
Biometrics
Biometrics
Signup and view all the flashcards
Identification Mode (Biometrics)
Identification Mode (Biometrics)
Signup and view all the flashcards
Verification Mode (Biometrics)
Verification Mode (Biometrics)
Signup and view all the flashcards
Liveliness Detection
Liveliness Detection
Signup and view all the flashcards
Vertical Privilege Escalation
Vertical Privilege Escalation
Signup and view all the flashcards
Horizontal Privilege Escalation
Horizontal Privilege Escalation
Signup and view all the flashcards
Study Notes
Access Control
- Involves three stages: identification, authentication, and authorization
- Identification: claiming an identity
- Authentication: proving identity
- Authorization: checking permissions for specific actions or data
Authentication Factors
- Something you know (e.g., passwords)
- Something you have (e.g., access cards)
- Something you are (e.g., biometrics)
Multifactor Authentication (MFA)
- Uses two or more authentication factors for enhanced security
- May impact usability
Password Security
- Challenges balancing strength and memorability
- Password strength is often measured by entropy
- Common passwords skew entropy calculations
- Shannon's entropy model helps estimate difficulty of guessing predictable passwords
Password Storage
- Uses hashing and salts to protect passwords
- Salt: a long, pseudo-random string prepended or appended to a password before hashing
- This prevents direct storage of plain text passwords
- Different passwords, even with the same value, result in different hashed values due to the inclusion of a salt
Password Attacks
- Brute-force attacks
- Dictionary attacks
- Pre-computed hash table attacks
Password Guidance
- Use three random words for memorable and strong passwords
Biometrics
- Physical biometrics: facial identification, fingerprint recognition
- Behavioural biometrics: how a user types
- Identification Mode: Using biometrics to find a user in a database
Verification Mode
- User matches with a stored template of biometric recognition
Fingerprint Biometrics Limitations
- Fingerprints can change due to cuts or damage
- Wet or faked fingerprints can cause issues
- Fingerprints can be lifted from surfaces
Biometric Concerns
- Privacy concerns over storing sensitive biometric data
- Failure to capture biometrics during enrollment or verification
- Balancing false accept and false reject rates with system usability and cost
- Concerns about diversity in machine learning training sets for biometrics
Access Control Model
- Four entities: subject (user/process), access request, object (resource), reference monitor
Least Privilege Principle
- Users should only have the minimum necessary access to perform their job
- Reduces risk of information disclosure and privilege escalation
Privilege Escalation Attacks
- Vertical escalation: gaining access to a higher privilege account
- Horizontal escalation: accessing similar functions with different data (e.g., another user's account)
- Often performed through password guessing or SQL injection
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.