▶ 6.8 Resources
Important Terms Introduced
active token
authentication database
authentication factors
average attack space
base secret
challenge-response token
character set
credential
cryptographic building block
cryptographic function
cryptographic randomness
diceware
dictionary attack
digest authentication
entropy
extreme threat
hash value
keystroke logger
low-hanging fruit
lower bound
nonce
offline attack
one-time password token
one-way hash
passive token
passphrase
password cracking
password manager
procedure diagram
process diagram
random
search space
shoulder surfing
smart card
sniff
social engineering
strong threat
three-factor authentication
two-factor authentication
upper bound
weak threat
work factor
Abbreviations Introduced ...
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.