Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
behavioral biometrics:
|
Authenticating a user by the normal actions that the user performs.
|
|
brute force attack:
|
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file.
|
|
cognitive biometrics:
|
Authenticating a user through the perception, thought process and understanding of the user.
|
|
common access card (CAC);
|
A department of Defense (DoD) smart card used for identification for active duty and reserve military personnel along with civilian employees and special contractors.
|
|
dictionary attack:
|
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.
|
|
hybrid attack:
|
A password attack that slightly alters dictionary words by adding number to the end of the password, spelling words backward, slightly misspelling words , or including special characters.
|
|
multifactor authentication:
|
Using more than one type of authentication credential.
|
|
password:
|
A secret combination of letters, numbers, and/or character that only the user should know.
|
|
Personal Identity verification(PIV):
|
A government standard for smart cards that covers all government employees.
|
|
rainbow tables:
|
Large pregenerated data sets of encrypted passwords used in password attacks.
|
|
single sign on(SSO):
|
Using one authentication credential to access multiple accounts or applications.
|
|
single factor authentication:
|
Using one type of authentication credentials.
|
|
smart card:
|
A card that contains an integrated circuit chip that can hold information used as part of the authentication process.
|
|
standard biometrics:
|
using fingerprints or other unique physical characteristics of a persons face, hands or eyes for authentication.
|
|
token:
|
a small device that can be affixed to a keychain with a window display that shows a code to be used for authentication.
|
|
trusted operating system (trusted OS):
|
A hardened operating system that can keep attackers from accessing and controlling critical parts of a computer system.
|