Podcast
Questions and Answers
What is the success rate of Spear Phishing?
What is the success rate of Spear Phishing?
Two-factor authentication is more secure than three-factor authentication.
Two-factor authentication is more secure than three-factor authentication.
False
What is the purpose of salting in password storage?
What is the purpose of salting in password storage?
To prevent rainbow table attacks
According to the password policy, users should use at least ______ random Diceware words for a single salted 100K hashed password.
According to the password policy, users should use at least ______ random Diceware words for a single salted 100K hashed password.
Signup and view all the answers
Match the following authentication factors with their descriptions:
Match the following authentication factors with their descriptions:
Signup and view all the answers
What is the primary goal of social engineering?
What is the primary goal of social engineering?
Signup and view all the answers
Three-factor authentication requires something you are.
Three-factor authentication requires something you are.
Signup and view all the answers
How many guesses per second can a GPU make when cracking an 8-character password?
How many guesses per second can a GPU make when cracking an 8-character password?
Signup and view all the answers
What is the principle of granting only the minimum authority needed?
What is the principle of granting only the minimum authority needed?
Signup and view all the answers
It's recommended to use a VPN from public access points.
It's recommended to use a VPN from public access points.
Signup and view all the answers
What is the purpose of DNS Domain Name System?
What is the purpose of DNS Domain Name System?
Signup and view all the answers
Permissions for ICT developers on a production server are typically _______.
Permissions for ICT developers on a production server are typically _______.
Signup and view all the answers
What is the purpose of a Domain Validation (DV) certificate?
What is the purpose of a Domain Validation (DV) certificate?
Signup and view all the answers
Match the following security tools with their purpose:
Match the following security tools with their purpose:
Signup and view all the answers
It's a good idea to use the same password across multiple systems.
It's a good idea to use the same password across multiple systems.
Signup and view all the answers
What is the recommendation for using SuperUser (sudo) or root privileges?
What is the recommendation for using SuperUser (sudo) or root privileges?
Signup and view all the answers
What is the primary issue with 4-digit PINs used by banks and credit cards as 2FA?
What is the primary issue with 4-digit PINs used by banks and credit cards as 2FA?
Signup and view all the answers
Using a passphrase with 64 characters or more is considered insecure.
Using a passphrase with 64 characters or more is considered insecure.
Signup and view all the answers
What is the recommended storage format for passwords?
What is the recommended storage format for passwords?
Signup and view all the answers
According to NIST SP 800-63B Appendix A, password expiration should be based on _______________________, not time.
According to NIST SP 800-63B Appendix A, password expiration should be based on _______________________, not time.
Signup and view all the answers
What is a recommended alternative to passwords?
What is a recommended alternative to passwords?
Signup and view all the answers
Two-factor authentication provides three layers of security.
Two-factor authentication provides three layers of security.
Signup and view all the answers
Match the following authentication methods with their descriptions:
Match the following authentication methods with their descriptions:
Signup and view all the answers
What is the main objective of security in the context of authentication?
What is the main objective of security in the context of authentication?
Signup and view all the answers
What is the recommended way to generate a strong password?
What is the recommended way to generate a strong password?
Signup and view all the answers
Diceware is a method of generating strong, unique, and memorable passwords.
Diceware is a method of generating strong, unique, and memorable passwords.
Signup and view all the answers
What is the recommended approach to managing UserIDs across multiple accounts?
What is the recommended approach to managing UserIDs across multiple accounts?
Signup and view all the answers
_____________ is a service that allows users to authenticate with multiple sites using a single account.
_____________ is a service that allows users to authenticate with multiple sites using a single account.
Signup and view all the answers
Match the following password strength meters with their features:
Match the following password strength meters with their features:
Signup and view all the answers
What is the recommended way to use a password manager?
What is the recommended way to use a password manager?
Signup and view all the answers
Two-factor authentication is a sufficient security measure to protect against all types of attacks.
Two-factor authentication is a sufficient security measure to protect against all types of attacks.
Signup and view all the answers
What is the benefit of using a Diceware PassPhrase?
What is the benefit of using a Diceware PassPhrase?
Signup and view all the answers
What is the most common cracking method?
What is the most common cracking method?
Signup and view all the answers
Using the same password across multiple sites is secure.
Using the same password across multiple sites is secure.
Signup and view all the answers
What is the primary weakness of knowledge-based authentication?
What is the primary weakness of knowledge-based authentication?
Signup and view all the answers
A strong password should have at least one ___________ character.
A strong password should have at least one ___________ character.
Signup and view all the answers
What is a problem with the password '13qeadzc@$WRSFXV'?
What is a problem with the password '13qeadzc@$WRSFXV'?
Signup and view all the answers
A good password policy requires periodic changes to passwords.
A good password policy requires periodic changes to passwords.
Signup and view all the answers
Match the following password characteristics with their descriptions:
Match the following password characteristics with their descriptions:
Signup and view all the answers
What is a recommended approach to password defense?
What is a recommended approach to password defense?
Signup and view all the answers
Study Notes
Password Security
- Nymi band uses fingerprint, facial recognition, ECG, and heartbeat pattern for authentication.
- PINs are insecure, with most people using a date to make them memorable, resulting in a limited range of 700 possibilities.
Better Password Policies
- User ID should be impersonal, not an email address.
- Passphrase should be 8-10-12-15 characters in length, with no complexity rules.
- Password expiration should be based on risk, not time.
- Reusing passwords should not be allowed.
- Block simple dictionary, commonly used, and previously breached passwords.
- Require two-factor ID, such as Microsoft Authenticator or U2F.
Password Storage
- Store passwords in a salted and hashed format using a standard library with Argon2id or PBKDF2.
- Do not invent your own password storage method.
- Obscurity does not equal security.
Password Alternatives
- Use a passkey instead of a password, starting with Microsoft or Google FIDO2.
- Use a hardware-based passkey with biometric authentication.
Security and Privacy
- Authentication should use multi-factor authentication (MFA).
- A strong password can be long, memorable, and satisfy bad rules.
- Generate a long random passphrase and check its strength and entropy.
Password Defense
- Check if a password has been previously breached or leaked.
- Use an email alias for the UserID.
- Use a password manager to generate unique, long, random, and strong passwords.
- Use a Diceware passphrase generator for long, memorable, and random passwords.
Password Managers
- Use a password manager such as 1Password, BitWarden, or MS Authenticator.
- Password managers can generate unique, long, random, and strong passwords for each account.
Authentication
- OpenID Connect authenticates users to multiple sites via a single account.
- Read the permissions requested to the authorization account.
Weak Passwords
- Weak passwords are guessable or reused across sites.
- Top three weak passwords are 123456, admin, and 12345678.
- Credential stuffing and cracking are common attacks.
Password Recovery
- "I forgot my password" relies on the strength of the email account's security and password.
- Answer security questions with lies to protect your identity.
Password Edit Rules
- Bad password rules include length, strength, and complexity requirements.
- Good password rules include using a passphrase and limiting password changes.
Authorization
- Authorization is the process of granting access rights to users.
- Role-based access control (RBAC) grants minimum authority needed for job functions.
- Permissions should be specific for each role and server.
Internet and Browser Security
- Use a DNS service that blocks malware and malicious domains.
- Use a VPN when accessing public networks.
- Always use HTTPS for sign-on.
- Use browser extensions to block tracking and test browser security.
Social Engineering
- Social engineering is a common attack method that uses social media to guess passwords and security questions.
- Be cautious when sharing personal information online.
- Use two-factor authentication to protect against phishing and cracking.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.