What is the term for the various parameters used during a login process?
Authentication factors
Common authentication factors include something you know, something you have, something you are, and somewhere you are.
What is an example of something you know in the context of authentication?
Password
A password is made up of a string of characters or a phrase known only to the user.
Fill in the blank: A personal identification number is an example of something you ______.
know
What is a common use of a personal identification number (PIN)?
ATM transactions
Users are commonly asked to provide a four-digit PIN when using an ATM.
What is another example of something you know that can unlock a device?
Unlock pattern
An unlock pattern is a specific sequence known only to the user.
What does ‘something you have’ refer to in authentication?
Physical items used for authentication
Examples include smart cards and USB security keys.
What is the role of a smart card in authentication?
Insert into a device for access
Smart cards are often used in conjunction with a PIN.
Fill in the blank: A USB security key contains a certificate that is specific to ______.
you
What is a hardware token in the context of authentication?
Device creating randomized numbers
These numbers are duplicated on the server for verification.
What is a software token?
Authentication application on mobile devices
Software tokens eliminate the need to carry additional hardware.
How can SMS be used as an authentication factor?
Sending a code to the user’s phone
This code is used during the login process.
What is an example of something you are in authentication?
Biometric data
This includes fingerprints, voiceprints, and other personal characteristics.
True or False: A picture of your fingerprint is stored for biometric authentication.
False
A mathematical representation of the fingerprint is stored instead.
What is a challenge associated with biometric authentication?
Difficult to change or modify
Changing a fingerprint or voiceprint is not feasible.
What does ‘somewhere you are’ refer to in authentication?
Location-based authentication
This can involve GPS data or IP address verification.
How can an attempted login from a distant country be detected?
Location information check
If the login attempt is from a different location than previously recorded, access may be denied.
What two types of location services can be combined to determine a user’s location?
IP address and GPS coordinates
This combination helps establish a more accurate physical location.