6.8 Resources

Important Terms Introduced

  • active token

  • authentication database

  • authentication factors

  • average attack space

  • base secret

  • challenge-response token

  • character set

  • credential

  • cryptographic building block

  • cryptographic function

  • cryptographic randomness

  • diceware

  • dictionary attack

  • digest authentication

  • entropy

  • extreme threat

  • hash value

  • keystroke logger

  • low-hanging fruit

  • lower bound

  • nonce

  • offline attack

  • one-time password token

  • one-way hash

  • passive token

  • passphrase

  • password cracking

  • password manager

  • procedure diagram

  • process diagram

  • random

  • search space

  • shoulder surfing

  • smart card

  • sniff

  • social engineering

  • strong threat

  • three-factor authentication

  • two-factor authentication

  • upper bound

  • weak threat

  • work factor

Abbreviations Introduced ...

Get Elementary Information Security, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.