Part 2 Chapter 5s
Home > Preview
The flashcards below were created by user
on FreezingBlue Flashcards.
Verifies that users are who they say they are?
means that data are only accessible by trusted users.
Is the assurance that data remain intact and unmodified in transit, storage, or use.
Assures that data are available when needed.
verifies what an authenticated user has the rights and permissions to do?
What are 5 standard Authentication systems?
- -1EEE 802.1x
What are the seven authentication methods?
- -password authentication
- -public-key authentication
- -zero-knowledge proofs
- -digital signatures
- -Secure shell
is a protocol that allows clients and servers to authenticate each other. After establishing a connection with a server, a client sends a hello message to the server that it wants to communicate with. The server responds with a hello message that also instructs the client on the protocol in use, the encryption method, a session identifier, and the compression method in use, if any. The sever then provides its digital signature (certificate) and requests one from the client.
SSL (Secure Sockets Layer)
Invokes the Authentication Header (AH) protocol that provides both communication integrity and authentication of the source of an IP datagram.
is a secure remote login protocol that performs host authentication on the Transport layer
SSH (Secure Shell)
uses a single knowledge factor for authentication
single-factor authentication (SFA)
requires two pieces of identification for authentication
TFA (Two-factor authentication)
requires at least one of each level of authentication factors.
MFA (multi-factor authentication)
What is the difference between Authentication and Identification?
Authentication proves you hold the proper credentials, while identification validates that the person entering the information is in fact the owner of the credentials.
is a category of devices and methods that uniquely identify people based on one or more of their physiological or behavioral characteristics. Physiological traits relate to the contours of a person's body. Behavioral characteristics measure unique performances of a person.
are portable devices that identify a person.
has an embedded microprocessor system. Can be either contract or noncontact.
is a U.S. Department of Defense dual-purpose card.
Common Access Card or Personal Identification Verification Card.
What would you like to do?
Home > Flashcards > Print Preview