click below
click below
Normal Size Small Size show me how
CYB1UofI_FISCH2.1
introduction to authentication and identification
| Question | Answer |
|---|---|
| what are key concepts when developing security measures regardless of if they're specific mechanisms or entire infrastructures | Identification and Authentication |
| what does identification do | makes a claim about what someone or something is |
| what does authentication do | establishes whether the claim about what someone or something is is true |
| True or False: There are a variety of ways to see identification and authentication processes take place every day | True |
| What is an example of a scenario in which identification and authentication take place in banking | an identification and authentication transaction is the use of payment cards that require a personal identification number (PIN) |
| how is the identification transaction handled in the use of payment cards that require a personal identification number (PIN) | When you swipe the magnetic strip on the card, you’re asserting that you’re the person indicated on the card. At this point, you’ve given your identification, but nothing more. |
| how is the authentication transaction handled in the use of payment cards that require a personal identification number (PIN) | When you’re prompted to enter the PIN associated with the card, you’re completing the authentication portion of the transaction, proving you’re the legitimate cardholder. |
| True or False: Some of the identification and authentication methods that we use daily are particularly fragile | True |
| what does it mean when identification and authentication methods are fragile | they depend largely on the honesty and diligence of those involved in the transaction |
| how is showing your id to buy alcohol a form of fragile identification and authentication | ur asking them 2 trust ur ID is genuine/accurate;can’t authenticate unless access2 system maintains the ID; depend on competence of person/system performing authentication;must b capable of performing authentication/detecting false/fraudulent activity |
| what methods can you use for identification and authentication | requiring simple usernames and passwords implementing purpose built hardware tokens that serve to establish your identity in multiple ways |