CISS 310 Modules 12-13
What as the first publicized wide-scale biometric breach? - answersBioStar 2
Define authentication in the context of information security. - answersThe process of
ensuring that the person or system desiring access to resources is authentic and not an
imposter.
Despite their widespread use, passwords provide
_______________________________________________ (pg. 356). - answersweak
protection and are constantly under attack
The weakness of passwords centers on what? (pg. 356) - answershuman memory
Even when users attempt to create stronger passwords, they generally follow which two
predictable patterns? (pg. 356) - answers*Appending*: When users combine letters,
numbers, and punctuation (character sets), they do it in a pattern. Most often they only
add a number after letters (caitlin1 or cheer99). If they add all three character sets, it is
in the sequence letters+punctuation+number (braden.8 or chris#6).
*Replacing*. Users also use replacements in predictable patterns. Generally, a zero is
used instead of the letter o (passw0rd), the digit 1 for the letter i (denn1s), or a dollar
sign for an s (be$tfriend).
Why are appending and replacing, in the context of password patterns, problematic?
(pg. 356) - answersAttackers are aware of these patterns in passwords and can search
for them, making it faster and easier to crack the password.
Attackers work to steal the file of password digests. Once that file is in the hands of
threat actors, it can be used in one of two ways. Describe the two methods. (pg. 356) -
answers*One method* is to use a stolen hash to impersonate the user. This has been
used to take advantage of a vulnerability in the Microsoft Windows NTLM (New
Technology LAN Manager) hash for storing passwords on a Windows endpoint
computer. An attacker who can steal the digest of an NTLM password could pretend to
be the user by sending that hash to the remote system to then be authenticated. This is
known as a *pass the hash attack.*
*A more common use* of a stolen file of password digests is for the threat actors to load
that file onto their own computers and then use a sophisticated *password cracker*,
which is software designed to break passwords. Password crackers create known
digests (called candidates) and then compare them against the stolen digests. When a
match occurs, the attacker knows the underlying password. Password crackers differ as
What as the first publicized wide-scale biometric breach? - answersBioStar 2
Define authentication in the context of information security. - answersThe process of
ensuring that the person or system desiring access to resources is authentic and not an
imposter.
Despite their widespread use, passwords provide
_______________________________________________ (pg. 356). - answersweak
protection and are constantly under attack
The weakness of passwords centers on what? (pg. 356) - answershuman memory
Even when users attempt to create stronger passwords, they generally follow which two
predictable patterns? (pg. 356) - answers*Appending*: When users combine letters,
numbers, and punctuation (character sets), they do it in a pattern. Most often they only
add a number after letters (caitlin1 or cheer99). If they add all three character sets, it is
in the sequence letters+punctuation+number (braden.8 or chris#6).
*Replacing*. Users also use replacements in predictable patterns. Generally, a zero is
used instead of the letter o (passw0rd), the digit 1 for the letter i (denn1s), or a dollar
sign for an s (be$tfriend).
Why are appending and replacing, in the context of password patterns, problematic?
(pg. 356) - answersAttackers are aware of these patterns in passwords and can search
for them, making it faster and easier to crack the password.
Attackers work to steal the file of password digests. Once that file is in the hands of
threat actors, it can be used in one of two ways. Describe the two methods. (pg. 356) -
answers*One method* is to use a stolen hash to impersonate the user. This has been
used to take advantage of a vulnerability in the Microsoft Windows NTLM (New
Technology LAN Manager) hash for storing passwords on a Windows endpoint
computer. An attacker who can steal the digest of an NTLM password could pretend to
be the user by sending that hash to the remote system to then be authenticated. This is
known as a *pass the hash attack.*
*A more common use* of a stolen file of password digests is for the threat actors to load
that file onto their own computers and then use a sophisticated *password cracker*,
which is software designed to break passwords. Password crackers create known
digests (called candidates) and then compare them against the stolen digests. When a
match occurs, the attacker knows the underlying password. Password crackers differ as