Term
|
Definition
Authenticating a user by the normal actions that the user performs. |
|
|
Term
|
Definition
A password attack in which every possible combination of letters, numbers, and characters is used to create encrypted passwords that are matched with those in a stolen password file. |
|
|
Term
|
Definition
Authenticating a user through the perception, thought process, and understanding of the user. |
|
|
Term
|
Definition
A Department of Defense (DoD) smart card used for identification for active-duty and reserve military personnel along with civilian employees and special contractors. |
|
|
Term
|
Definition
A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file. |
|
|
Term
|
Definition
A password attack that slightly alters dictionary words by adding numbers to the end of the password, spelling words backward, slightly misspelling words, or including special characters. |
|
|
Term
multifactor authentication |
|
Definition
Using more than one type of authentication credential. |
|
|
Term
|
Definition
A secret combination of letters, numbers, and/or characters that only the user should know. |
|
|
Term
Personal Identity Verification (PIV) |
|
Definition
A government standard for smart cards that covers all government employees. |
|
|
Term
|
Definition
Large pregenerated data sets of encrypted passwords used in password attacks. |
|
|
Term
|
Definition
Using one authentication credential to access multiple accounts or applications. |
|
|
Term
single-factor authentication |
|
Definition
Using one type of authentication credentials. |
|
|
Term
|
Definition
A card that contains an integrated circuit chip that can hold information used as part of the authentication process. |
|
|
Term
|
Definition
Using fingerprints or other unique physical characteristics of a person's face, hands, or eyes for authentication. |
|
|
Term
|
Definition
A small device that can be affixed to a keychain with a window display that shows a code to be used for authentication. |
|
|
Term
trusted operating system (trusted OS) |
|
Definition
A hardened operating system that can keep attackers from accessing and controlling critical parts of a computer system. |
|
|