Podcast
Questions and Answers
What is a primary concern when using biometrics in systems?
What is a primary concern when using biometrics in systems?
Authorization is the same as identification in security systems.
Authorization is the same as identification in security systems.
False
What does the Principle of Least Privilege entail?
What does the Principle of Least Privilege entail?
Users should only be given the minimum access necessary to perform their job.
Vertical escalation involves gaining access to a ________ privilege account.
Vertical escalation involves gaining access to a ________ privilege account.
Signup and view all the answers
Match the following access control terms with their definitions:
Match the following access control terms with their definitions:
Signup and view all the answers
What are the three stages involved in access control?
What are the three stages involved in access control?
Signup and view all the answers
Multifactor Authentication (MFA) enhances security but does not affect usability.
Multifactor Authentication (MFA) enhances security but does not affect usability.
Signup and view all the answers
What is a method used to protect passwords during storage?
What is a method used to protect passwords during storage?
Signup and view all the answers
A long pseudo-random string added to a password before hashing is known as a ______.
A long pseudo-random string added to a password before hashing is known as a ______.
Signup and view all the answers
Which of the following is NOT a challenge in password security?
Which of the following is NOT a challenge in password security?
Signup and view all the answers
Match the following biometrics with their types:
Match the following biometrics with their types:
Signup and view all the answers
Liveliness detection aims to confirm that a biometric sample comes from a live person.
Liveliness detection aims to confirm that a biometric sample comes from a live person.
Signup and view all the answers
Name one type of attack aimed at compromising password security.
Name one type of attack aimed at compromising password security.
Signup and view all the answers
Study Notes
Access Control
- Involves three stages: identification, authentication, and authorization
- Identification: claiming an identity
- Authentication: proving identity
- Authorization: checking permissions for specific actions or data
Authentication Factors
- Something you know (e.g., passwords)
- Something you have (e.g., access cards)
- Something you are (e.g., biometrics)
Multifactor Authentication (MFA)
- Uses two or more authentication factors for enhanced security
- May impact usability
Password Security
- Challenges balancing strength and memorability
- Password strength is often measured by entropy
- Common passwords skew entropy calculations
- Shannon's entropy model helps estimate difficulty of guessing predictable passwords
Password Storage
- Uses hashing and salts to protect passwords
- Salt: a long, pseudo-random string prepended or appended to a password before hashing
- This prevents direct storage of plain text passwords
- Different passwords, even with the same value, result in different hashed values due to the inclusion of a salt
Password Attacks
- Brute-force attacks
- Dictionary attacks
- Pre-computed hash table attacks
Password Guidance
- Use three random words for memorable and strong passwords
Biometrics
- Physical biometrics: facial identification, fingerprint recognition
- Behavioural biometrics: how a user types
- Identification Mode: Using biometrics to find a user in a database
Verification Mode
- User matches with a stored template of biometric recognition
Fingerprint Biometrics Limitations
- Fingerprints can change due to cuts or damage
- Wet or faked fingerprints can cause issues
- Fingerprints can be lifted from surfaces
Biometric Concerns
- Privacy concerns over storing sensitive biometric data
- Failure to capture biometrics during enrollment or verification
- Balancing false accept and false reject rates with system usability and cost
- Concerns about diversity in machine learning training sets for biometrics
Access Control Model
- Four entities: subject (user/process), access request, object (resource), reference monitor
Least Privilege Principle
- Users should only have the minimum necessary access to perform their job
- Reduces risk of information disclosure and privilege escalation
Privilege Escalation Attacks
- Vertical escalation: gaining access to a higher privilege account
- Horizontal escalation: accessing similar functions with different data (e.g., another user's account)
- Often performed through password guessing or SQL injection
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the key aspects of access control, including identification, authentication, and authorization. Explore multifactor authentication, password security, and effective password storage techniques. This quiz covers essential concepts critical for maintaining security in digital systems.