Understanding Authentication Methods

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following actions best describes the process of authentication?

  • Granting permissions to access specific resources.
  • Transforming data into an unreadable format.
  • Ensuring data remains consistent during transfer.
  • Verifying a user's identity to allow system access. (correct)

What is the primary goal of authentication in a system?

  • To allow faster creation of user accounts.
  • To confirm that a user is who they claim to be. (correct)
  • To automatically monitor all user activity.
  • To encrypt sensitive data stored within the system.

In single-factor authentication, which type of factor might be utilized?

  • A unique biometric characteristic of the user.
  • The user's current geographical position.
  • A piece of information known by the user. (correct)
  • A physical object possessed by the user.

Which combination accurately represents two-factor authentication?

<p>Using a password in conjunction with a security token. (A)</p> Signup and view all the answers

Which of these is NOT considered a standard authentication factor?

<p>Your body temperature. (D)</p> Signup and view all the answers

Which option exemplifies a knowledge-based authentication factor?

<p>Entering a PIN. (A)</p> Signup and view all the answers

Which authentication method uses an object held by the user?

<p>Using a security token. (B)</p> Signup and view all the answers

Which of the following is categorized as an 'inherence' factor in authentication?

<p>An iris scan. (B)</p> Signup and view all the answers

What does the acronym 'MFA' stand for in the context of cybersecurity?

<p>Mandatory File Access. (D)</p> Signup and view all the answers

Why is two-factor authentication considered more secure than single-factor authentication?

<p>It uses multiple, different authentication factors. (B)</p> Signup and view all the answers

In a typical authentication flow, what information does the client usually provide first?

<p>A security token. (D)</p> Signup and view all the answers

What does the server utilize to validate a user's credentials during authentication?

<p>A database. (C)</p> Signup and view all the answers

After successfully authenticating a user, what does the server commonly generate to maintain the session?

<p>Access and refresh tokens. (C)</p> Signup and view all the answers

In remote authentication, what primary security purpose does a 'nonce' serve?

<p>To prevent replay attacks. (B)</p> Signup and view all the answers

For what specific purpose is a challenge-response protocol used?

<p>Verifying remote user identities. (D)</p> Signup and view all the answers

Which authentication method relies on only one piece of identifying information?

<p>Single-factor authentication. (C)</p> Signup and view all the answers

What does two-factor authentication combine?

<p>A password and a biometric or security token. (A)</p> Signup and view all the answers

What constitutes three-factor authentication?

<p>Using three different and independent factors. (C)</p> Signup and view all the answers

What additional capability is integrated into a smartcard beyond basic data storage?

<p>Onboard memory and a processor. (D)</p> Signup and view all the answers

Which authentication factor is most susceptible to phishing attacks?

<p>Knowledge-based factors. (C)</p> Signup and view all the answers

What is the main characteristic of an offline dictionary attack?

<p>It compares password hashes against a list of common passwords. (D)</p> Signup and view all the answers

What makes a 'specific account attack' unique?

<p>It broadly targets many accounts at once. (D)</p> Signup and view all the answers

What is a key characteristic of a popular password attack?

<p>It attempts to brute-force a single account. (A)</p> Signup and view all the answers

What type of vulnerability is exploited when an attacker guesses a password based on personal information?

<p>Token hijacking. (B)</p> Signup and view all the answers

What is 'workstation hijacking'?

<p>Gaining unauthorized control over an unattended computer. (A)</p> Signup and view all the answers

What is the potential risk if a user writes down a system-assigned password?

<p>The workstation becomes more vulnerable. (C)</p> Signup and view all the answers

Which countermeasure is most effective at mitigating offline dictionary attacks?

<p>Protecting the password file. (B)</p> Signup and view all the answers

What is the primary function of an account lockout policy?

<p>To prevent repeated login attempts. (C)</p> Signup and view all the answers

What is the main reason for enforcing strong password policies?

<p>To make passwords more difficult for attackers to guess. (C)</p> Signup and view all the answers

What is the main purpose of using a salt value when hashing passwords?

<p>To add random data to the password before hashing. (B)</p> Signup and view all the answers

Flashcards

What is Authentication?

Verifying a user's identity.

Primary purpose of authentication?

To confirm the user is legitimate.

Single-factor authentication factor?

Something you know, like a password.

What is two-factor authentication?

Combines two different types of authentication factors.

Signup and view all the flashcards

Not an authentication factor?

Temperature is not an authentication factor.

Signup and view all the flashcards

Example of knowledge-based factor?

A PIN is something you know.

Signup and view all the flashcards

Possession-based factor?

A token is a physical object that you have.

Signup and view all the flashcards

Inherence-based factor?

An iris scan uses a biometric trait.

Signup and view all the flashcards

What does MFA stand for?

Multi-Factor Authentication

Signup and view all the flashcards

Why is two-factor authentication more secure?

It adds an extra security layer by combining different factors.

Signup and view all the flashcards

What does the client submit first?

Login credentials (username and password).

Signup and view all the flashcards

What verifies credentials?

A database

Signup and view all the flashcards

What does the server generate after a match?

Access and refresh tokens

Signup and view all the flashcards

Purpose of a nonce?

Defend against replay attacks

Signup and view all the flashcards

Challenge-response protocol is used for?

Remote user authentication

Signup and view all the flashcards

Which method uses a single credential?

Single-factor authentication

Signup and view all the flashcards

What does two-factor authentication combine?

A password and a biometric or token

Signup and view all the flashcards

What is three-factor authentication?

Using three different factors

Signup and view all the flashcards

Additional function of a smartcard?

Memory and a processor.

Signup and view all the flashcards

Most vulnerable factor to phishing?

Knowledge-based

Signup and view all the flashcards

What is an offline dictionary attack?

Comparing password hashes to common ones.

Signup and view all the flashcards

Attack targeting a specific account repeatedly?

A specific account attack

Signup and view all the flashcards

What is a popular password attack?

Using common passwords on many accounts

Signup and view all the flashcards

Vulnerability guessing based on personal details?

Password guessing

Signup and view all the flashcards

What is workstation hijacking?

Taking over an unattended computer

Signup and view all the flashcards

Study Notes

Authentication

  • Authentication verifies a user’s identity.
  • The primary purpose of authentication is to confirm a user is legitimate.
  • Single-factor authentication uses a knowledge factor, like a password.
  • Two-factor authentication combines two different types of factors.

Authentication Factors

  • Knowledge-based factors involves something you know.
  • Possession-based factors involves something you have.
  • Inherence-based factors involves what you are.
  • Temperature is not an authentication factor.
  • A PIN is an example of a knowledge-based factor.
  • A security token is an example of a possession-based factor and is a physical object.
  • An iris scan is an example of an inherence-based factor and uses a biometric trait.

Multi-Factor Authentication (MFA)

  • MFA stands for Multi-Factor Authentication.
  • MFA uses two or more different factors.
  • Two-factor authentication is more secure than single-factor authentication because it adds an extra security layer.
  • The client submits login credentials first in the authentication flow.
  • The server verifies credentials by checking a database.
  • After a successful match, the server generates access and refresh tokens for session continuation.
  • Two-factor authentication combines factors from different categories.
  • Three-factor authentication involves using three different factors and requires three distinct proofs

Authentication Methods

  • Single-factor authentication uses a single credential and one barrier.
  • Remote user authentication verifies users over networks and challenge-response protocol.

Security Vulnerabilities and Attacks

  • Passwords are common targets for phishing attacks.
  • An offline dictionary attack compares password hashes to common ones and uses known hash values to guess passwords.
  • A specific account attack targets a specific account repeatedly and focuses on one account.
  • A popular password attack tests well-known passwords across many accounts using common passwords
  • Password guessing involves guessing based on personal details.
  • Attackers use personal information to guess passwords in password guessing.
  • Temperature is not used as a factor.
  • Workstation hijacking exploits an unattended workstation and involves taking over an unattended computer.
  • Writing down a system-assigned password increases vulnerability.
  • The vulnerability that arises from using default passwords makes it easier for attackers because defaults are well known.
  • Reusing a password across devices increases vulnerability and it raises the risk if one is compromised.
  • Storing passwords in plain text leads to data breaches because it is easily compromised.
  • If a password file is compromised, attackers can run cracking programs leading to brute-force attempts.

Countermeasures and Policies

  • Protecting the password file reduces the risk of offline dictionary attacks.
  • Account lockout limits repeated login attempts and blocks further attempts.
  • Enforcing strong password policies increases security by making passwords hard to guess.
  • Unique password policies prevents password reuse across devices and reduces risk.
  • Intrusion detection systems (IDS) monitors for suspicious activity and detects unauthorized access attempts.
  • Guidelines for strong password creation. helps users to create strong passwords.
  • Using salt in hashing helps defend against dictionary attacks because salt complicates pre-computation.

Hashing and Encryption

  • A salt value in password hashing adds random data and randomizes the hash output, diversifying the hash output.
  • The UNIX crypt(3) function, used for password hashing, is based on DES.
  • The UNIX password hashing scheme performs 25 iterations.
  • Hashed password storage is vulnerable to guessing attacks allowing attackers to run cracking programs.
  • Using a hashed password scheme slows down attackers and uses salt and a slow hash function.
  • Hashed passwords secures stored data.
  • Cryptographic hashing provides one-way encryption in authentication producing irreversible hashes.
  • Encrypted communication links secures data in transit and secures password file transmission.
  • The term "hashed password" means that a password has been processed by a hash algorithm.
  • Multiple iterations of encryption slow down attackers and improves password security in UNIX systems.
  • A nonce creates a unique session and defends against replay attacks in remote authentication.

Tokens

  • A security token is a physical device for authentication and is a tangible authentication tool.
  • Tokens allow session continuation.
  • Access tokens allow continued access and maintain the session.
  • A refresh token extends the session securely and renews session access.
  • A memory card token type contains electronic memory inside.
  • A smartcard token type includes a built-in processor and processes data internally.
  • Tokens generated by the server manage the session and control session continuity.
  • A stolen security token may allow access if unaccompanied by another factor.

Biometrics

  • Biometric authentication uses unique physical traits and relies on physical characteristics.
  • Fingerprint and facial recognition are two common biometric examples and and are physical traits.
  • Iris scan is biometric and an inherence-based factor.
  • A common risk of biometric authentication is privacy issues as it may raise privacy concerns.
  • Biometric systems may be affected by environmental factors.
  • A biometric system registers biometric traits during the enrollment process and compares presented biometric data with stored templates during verification.
  • The biometric system matches the biometric template.
  • A biometric method, like fingerprint scanning, requires a sensor to capture data.
  • Identification biometric system relies solely on biometrics and does not need extra credentials.
  • Biometric templates are compared during authentication serve as references.

ATM Security

  • A dedicated data connection in ATM systems secures the connection and isolates sensitive data.
  • Connecting ATM systems over internet-linked networks increases ATM vulnerability because Internet connectivity raises risks.
  • When ATM data crosses an unsecured network, data can be captured by attackers, leading to data interception.
  • Vulnerability that affects ATM transactions, data is exposed to interception, leading to confidentiality and integrity risks.

Replay Attacks

  • A nonce creates a unique session.
  • A replay attack reuses valid messages maliciously and entails reusing captured authentication messages.

Authentication Systems

  • The advantages of multi-factor authentication requires multiple proofs.
  • The key weakness of single-factor authentication is that only one barrier exists so it relies on a single proof.
  • An authentication system grants access when a password is verified and it allows entry upon verification.
  • The ultimate goal of user authentication is to confirm identity and it aims to verify who you are.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser