ID Vocab
ARC General
IIS Authentication
Famous Hackers
Encryption
100
A statement that one subject, such as a person or organization, makes about itself or another subject.
What is a claim?
100
The first two letters for the password to the ARC KeyPass
What is GL?
100
Grants users access to the public areas of your Web site without prompting them for a user name or password.
What is Anonymous Authentication?
100
Know as 'C0mrade', convicted of hacking at the age of 15
Who is Jonathan James?
100
uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.
What is Triple DES (Data Encryption Standard)?
200
A 'third-party' application that manages authentication claims.
What is a security token service?
200
Once an important VM host in production, this server is about to be decommissioned.
What is arc-server7?
200
This authentication type is part of the HTTP specification, and is supported by most browsers. The disadvantage is that Web browsers using it transmit passwords in an unencrypted form.
What is Basic Authentication?
200
He is best known for pioneering 'social engineering' as it relates to computer security.
Who is Kevin Mitnick?
200
An asymmetric public-key encryption algorithm and the standard for encrypting data sent over the internet.
What is RSA?
300
The function of specifying access rights to an application.
What is authorization?
300
This directory serves as a 'Common' directory for the organization, and everyone has access to it.
What is 'ARC Materials'?
300
A secure form of authentication because the user name and password are not sent across the network. Is the best authentication scheme in an intranet environment where users have Windows domain accounts, especially when using Kerberos.
What is Integrated Windows Authentication?
300
Is is credited with acquiring over 170 million credit and ATM card numbers in the US in a period of two years and leader of the hacker group called 'ShadowCrew'
Who is Albert Gonzalez?
300
This symmetric cipher splits messages into blocks of 64 bits and encrypts them individually and is known for it's speed.
What is Blowfish?
400
The process of verifying the identity of claimant.
What is authentication?
400
The number of external doors that must be secured before setting the ARC alarm.
What is 4?
400
This process authenticates by checking the contents of an encrypted digital identification submitted by the Web browser for the user during the logon process.
What is Certificate Authentication?
400
His most famous hack involved utilizing his knowledge of telephone systems to win a new Porsche from a radio station contest.
Who is Kevin Poulsen?
400
The algorithm trusted as the standard by the U.S. Government and numerous organizations. Is largely considered impervious to all attacks, with the exception of brute force.
What is AES (Advanced Encryption Standard)?
500
Added to the 4.5 framework, this set of technologies was a standalone download in .NET 3.5
What is Windows Identity Foundation?
500
This former director of the ARC has been retired for just over a year.
Who is Roberta Mullen?
500
This method addresses the primary weaknesses of basic authentication: sending passwords in plain text. It uses a challenge/response mechanism, which sends a hash instead of a password over the network.
What is Digest Authentication?
500
Scottish hacker who illegally gained access to 97 computers belonging to the US Armed forces and NSA in a 13 month period while claiming to be looking for suppression of 'free energy' and 'UFO activity cover-ups'.
Who is Gary McKinnon?
500
Any system of encryption wherein cryptographic keys are paired, such that an encryption performed with one key can be decrypted only by the other member of the pair, and possession of one key does not enable the practical computation of the other.
What is Public-key cryptography?
M
e
n
u