Account Authentication & Password Security Flashcards
Master Account Authentication & Password Security with these flashcards. Review key terms, definitions, and concepts using active recall to strengthen your understanding and ace your exams.
Swipe to navigate between cards
Front
Authentication
Back
The process of verifying a user's identity before granting access to a system or resource. Authentication can rely on something you know, something you have, or something you are.
Front
Password Strength
Back
A measure of how resistant a password is to guessing and cracking attacks. Strength depends on length, complexity, unpredictability, and avoidance of common patterns or dictionary words.
Front
Passphrase
Back
A sequence of words or a sentence used as a password to increase memorability and entropy. Passphrases are typically longer than passwords and offer better resistance to brute-force attacks when well chosen.
Front
Two-factor Authentication
Back
A security method requiring two different types of credentials from independent categories to verify identity. Common implementations combine a password plus a one-time code from a device or app.
Front
Multi-factor Authentication
Back
An authentication approach that requires two or more independent credentials from categories like knowledge, possession, and inherence. MFA significantly reduces the risk of unauthorized access compared with single-factor methods.
Front
Password Manager
Back
A tool that securely stores and manages passwords, often generating strong unique credentials for each account. Password managers reduce reuse of passwords and help users maintain complex secrets without memorization.
Front
Hashing
Back
A one-way cryptographic function that converts data (like a password) into a fixed-length value called a hash. Hashing is used to store passwords securely so the original password cannot be easily recovered from the hash.
Front
Salt
Back
Random data added to a password before hashing to ensure identical passwords produce different hashes. Salting defends against precomputed attacks like rainbow tables and makes large-scale cracking more difficult.
Front
Brute-force Attack
Back
An attack that tries every possible password combination until the correct one is found. The time required grows exponentially with password length and complexity, so long, complex passwords greatly mitigate this threat.
Front
Dictionary Attack
Back
A password-cracking method that tries a list of likely passwords or words rather than all combinations. It is effective against weak or commonly used passwords and can be enhanced with common substitutions and patterns.
Front
Phishing
Back
A social engineering technique where attackers trick individuals into revealing credentials or sensitive information, often using fraudulent emails or websites. Phishing defenses include user education, email filtering, and two-factor authentication.
Front
Social Engineering
Back
Manipulative techniques used to exploit human psychology to gain unauthorized access or information. Social engineering often bypasses technical controls by targeting trust, fear, or urgency.
Front
Biometrics
Back
Authentication methods that rely on physical or behavioral traits like fingerprints, facial recognition, or voice patterns. Biometrics can be convenient but raise privacy and spoofing concerns, and compromised biometric data cannot be changed like a password.
Front
Session Management
Back
Mechanisms that maintain and secure a user's authenticated state after login, typically using cookies or tokens. Proper session management includes expiration, secure storage, and protection against hijacking or fixation attacks.
Front
Single Sign-On
Back
An authentication scheme allowing a user to access multiple applications with one set of credentials. SSO improves usability but centralizes risk, so it must be combined with strong authentication and monitoring.
Front
OAuth
Back
An open standard for delegated access that allows applications to act on behalf of a user without sharing the user's password. OAuth issues tokens with specific scopes and lifetimes to limit access.
Front
Account Recovery
Back
Processes that let users regain access to their accounts when they forget credentials, typically via email, phone, or security questions. Secure recovery must balance usability with protections against takeover by attackers.
Front
Transport Layer Security
Back
A protocol (TLS) that encrypts data in transit between clients and servers to prevent eavesdropping and tampering. Properly configured TLS is essential for protecting credentials submitted during sign-in.
Continue learning
Explore other study materials generated from the same source content. Each format reinforces your understanding of Account Authentication & Password Security in a different way.
Create your own flashcards
Turn your notes, PDFs, and lectures into flashcards with AI. Study smarter with spaced repetition.
Get Started Free