Term
|
Definition
| Authenticating a user by the normal actions that the user performs. |
|
|
Term
|
Definition
| A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file. |
|
|
Term
|
Definition
| Authenticating a user through the perception, thought process, and understanding of the user. |
|
|
Term
|
Definition
| A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors. |
|
|
Term
|
Definition
| A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file. |
|
|
Term
|
Definition
| A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters. |
|
|
Term
| Multifactor authentication |
|
Definition
| Using more than one type of authentication credential. |
|
|
Term
|
Definition
| A secret combination of letters, numbers, and/or characters that only the user should know. |
|
|
Term
| Personal Identity Verification (PIV) |
|
Definition
| A government standard for smart cards that covers all government employees. |
|
|
Term
|
Definition
| Large pregenerated data sets of encrypted passwords used in password attacks. |
|
|
Term
|
Definition
| Using one authentication credential to access multiple accounts or applications. |
|
|
Term
| Single-factor authentication |
|
Definition
| Using one type of authentication credentials. |
|
|
Term
|
Definition
| A card that contains an integrated circuit chip that can hold information used as part of the authentication process. |
|
|
Term
|
Definition
| Using fingerprints or other unique physical characteristics of a persons face, hands, or eyes for authentication. |
|
|
Term
|
Definition
| A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication. |
|
|
Term
| Trusted operating system (trusted OS) |
|
Definition
| A hardened operating system that can keep attackers from accessing and controlling critical parts of a computer system. |
|
|