Identification and Authentication Overview

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of authentication involves something you know?

  • Type 2 Authentication
  • Type 3 Authentication
  • Multi-factor Authentication
  • Type 1 Authentication (correct)

Passwords are considered the strongest form of authentication.

False (B)

What is an example of Type 3 Authentication?

Biometrics (e.g., fingerprint, iris scan)

Secret questions as knowledge factors are often _____ examples because they can be easily researched.

<p>poor</p> Signup and view all the answers

Match the following types of authentication with their definitions:

<p>Type 1 = Knowledge factors like passwords Type 2 = Possession factors like smart cards Type 3 = Biometric factors like fingerprints</p> Signup and view all the answers

What is a common characteristic of weak passwords?

<p>They are easy to guess personal information (A)</p> Signup and view all the answers

Key stretching adds time to password verification to prevent brute-force attacks.

<p>True (A)</p> Signup and view all the answers

Name one strategy to enhance password security.

<p>Use a combination of upper/lowercase letters, numbers, and symbols.</p> Signup and view all the answers

What is a key limitation of brute force attacks when it comes to one-time pads?

<p>They generate too many false positives. (C)</p> Signup and view all the answers

Clipping levels are used to prevent users from guessing passwords by restricting logins.

<p>False (B)</p> Signup and view all the answers

What is the minimum password length recommended by the U.S. Department of Defense?

<p>14 characters</p> Signup and view all the answers

A single-use password is also known as a _____ in online banking.

<p>TAN</p> Signup and view all the answers

Match the following password management terms with their definitions:

<p>Password history = Remembers the last 24 passwords used Maximum password age = Password must be changed every 90 days Minimum password age = Must wait 2 days before changing password again Complexity requirements = Passwords must include various character types</p> Signup and view all the answers

Which of the following is NOT a possession factor in Type 2 authentication?

<p>Password (B)</p> Signup and view all the answers

Single-use passwords are considered very convenient by most users.

<p>False (B)</p> Signup and view all the answers

How long is an account typically locked after too many failed login attempts?

<p>One hour</p> Signup and view all the answers

Which of the following is NOT a method of biometric authentication?

<p>Social Security number (C)</p> Signup and view all the answers

Behavioral characteristics used in biometrics are permanent and never change.

<p>False (B)</p> Signup and view all the answers

Name one potential health issue that can be revealed through biometric authentication.

<p>Vascular diseases</p> Signup and view all the answers

Biometric data collection can be more invasive, particularly when it involves __________.

<p>Iris scans</p> Signup and view all the answers

Which of the following is a characteristic of contactless cards?

<p>They can be read by proximity. (A)</p> Signup and view all the answers

Match the following biometric methods with their characteristics:

<p>Fingerprint = Unique to each individual Facial recognition = Can be easily photographed Iris recognition = More invasive but secure Voice pattern = Can be recorded and replicated</p> Signup and view all the answers

What is a major issue with biometric authentication?

<p>It can't be replaced if lost. (A)</p> Signup and view all the answers

HOTP stands for HMAC-based One-Time Password.

<p>True (A)</p> Signup and view all the answers

What does FRR stand for in biometric authentication?

<p>False Rejection Rate</p> Signup and view all the answers

The U.S. Office of Personnel Management suffered a data breach involving biometric data.

<p>True (A)</p> Signup and view all the answers

Biometric identifiers are categorized as physiological and __________ characteristics.

<p>behavioral</p> Signup and view all the answers

Biometric authentication can be compromised by __________ of the individual's features.

<p>photographs</p> Signup and view all the answers

Match the following types of cards with their characteristics:

<p>Smart Cards = Contain an integrated circuit chip Magnetic Stripe Cards = Swiped through a reader Tokens = Can be hardware or software based Biometric Authentication = Uses unique human physical traits</p> Signup and view all the answers

The Crossover Error Rate (CER) represents which of the following?

<p>The intersection point of FRR and FAR (D)</p> Signup and view all the answers

Contact cards can only be credit cards.

<p>False (B)</p> Signup and view all the answers

What are examples of something you are in authentication methods?

<p>Fingerprint, iris scan, facial geometry</p> Signup and view all the answers

What is the main principle of the Least Privilege access control concept?

<p>Users should have the minimum necessary access. (C)</p> Signup and view all the answers

Mandatory Access Control (MAC) assigns access based on user identity alone.

<p>False (B)</p> Signup and view all the answers

What does RBAC stand for in access control?

<p>Role-Based Access Control</p> Signup and view all the answers

Access control that uses labels to assign permissions based on clearance is known as _____ .

<p>Mandatory Access Control (MAC)</p> Signup and view all the answers

Which method of access control is often used when confidentiality is most important?

<p>Mandatory Access Control (MAC) (A)</p> Signup and view all the answers

Define the term 'Need to Know' in access control.

<p>A principle that states if a user does not need access to information, they should not have it.</p> Signup and view all the answers

Match the access control method with its primary focus:

<p>DAC = Availability MAC = Confidentiality RBAC = Integrity ABAC = Conditions and Attributes</p> Signup and view all the answers

Attribute-Based Access Control (ABAC) is a policy-neutral access control mechanism.

<p>True (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Identification and Authentication

  • Identification establishes the user’s identity through factors like name, username, or ID number.
  • Authentication confirms identity with multi-factor methods for better security.

Authentication Types

  • Type 1 (Knowledge Factors): Use something known (e.g., passwords, PINs).

    • Most common form; weakest due to vulnerability to compromise.
    • Ensure passwords are complex (14+ characters, include numbers and symbols).
    • Password policies include expiration dates and limits on reuse to enhance security.
    • Secret questions are often poorly chosen and can be easily researched.
  • Type 2 (Possession Factors): Use something possessed (e.g., ID cards, tokens).

    • Forms of possession include credit cards and smart cards.
    • Single-use passwords enhance security but may be inconvenient for users.
    • Magnetic stripe cards are easy to duplicate; smart cards use integrated circuits.
    • Tokens can be hardware or software-based, with HOTP and TOTP protocols.
  • Type 3 (Biometric Factors): Use unique biological traits (e.g., fingerprints, facial recognition).

    • More secure but can have false acceptance/rejection issues.
    • Biometric systems must balance false rejection rate (FRR) and false acceptance rate (FAR) to achieve a crossover error rate (CER).
    • Physiological characteristics are stable, while behavioral characteristics may change.

Issues with Biometric Authentication

  • Biometric data can expose sensitive information about health and identity, raising privacy concerns.
  • Attacks can involve duplicating biometric traits from images or recordings.
  • Lost passwords or ID cards can be replaced; compromised biometrics cannot.

Authorization

  • Authorization determines what information users can access.
  • Implement access control models based on security goals, including Least Privilege and Need to Know principles.

Access Control Models

  • Discretionary Access Control (DAC):

    • Object owners assign permissions at their discretion; common in file systems.
    • Utilizes Discretionary ACLs (DACLs) based on user identification.
  • Mandatory Access Control (MAC):

    • Access is based on labels and classifications; prioritizes confidentiality.
    • Requires user's clearance level to surpass the object's security label.
  • Role-Based Access Control (RBAC):

    • Access is based on user roles, simplifying management of permissions within large organizations.
    • Enforces separation of duties to prevent privilege creep.
  • Attribute-Based Access Control (ABAC):

    • Combines user, object, and environmental attributes to determine access.
    • Offers flexibility in access management based on dynamic conditions.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Mastering Azure Active Directory
7 questions
Autenticación Fuerte y Mutua
40 questions
Use Quizgecko on...
Browser
Browser