6.8 Resources

Important Terms Introduced

  • active token

  • authentication database

  • authentication factors

  • average attack space

  • base secret

  • challenge-response token

  • character set

  • credential

  • cryptographic building block

  • cryptographic function

  • cryptographic randomness

  • diceware

  • dictionary attack

  • digest authentication

  • entropy

  • extreme threat

  • hash value

  • keystroke logger

  • low-hanging fruit

  • lower bound

  • nonce

  • offline attack

  • one-time password token

  • one-way hash

  • passive token

  • passphrase

  • password cracking

  • password manager

  • procedure diagram

  • process diagram

  • random

  • search space

  • shoulder surfing

  • smart card

  • sniff

  • social engineering

  • strong threat

  • three-factor authentication

  • two-factor authentication

  • upper bound

  • weak threat

  • work factor

Abbreviations Introduced ...

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.