Quiz

Passwords: Do you speak geek?

Part of the Security management glossary:

During his keynote speech at the RSA Security conference in February, Bill Gates predicted the demise of the traditional password because it cannot "meet the challenge" of keeping critical information secure. This week we challenge you to correctly identify ten password-related terms.

1. This is the process of determining whether someone is who he says he is.
What is it?

2. This kind of password is designed to be difficult for a person or program to discover; essential components include sufficient length and a mix of character types.
What is it?

3. This application program can be used by a network administrator to retrieve a forgotten password. Unfortunately, it can also be used by an intruder to obtain unauthorized access to resources.
What is it?

4. This type of authentication, when used with a security token, is expected by some experts to replace traditional passwords.
What is it?

5. This is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications.
What is it?

6. This describes what happens when users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices.
What is it?

7. This is a scam where the perpetrator sends out legitimate-looking e-mails appearing to come from a well-known Web site in an effort to get passwords and other sensitive information from the recipient.
What is it?

8. This describes a non-technical kind of password theft that relies on people's willingness to help strangers who are in trouble.
What is it?

9. This kind of malware (Bagle, for example) relies on the recipient's willingness to open a password-protected attachment that has been received in an e-mail.
What is it?

10. This direct observation technique is one of the easiest ways to fraudulently obtain passwords.
What is it?
 

This was last updated in August 2008
Posted by: Margaret Rouse

Related Terms

Definitions

  • employee monitoring

    - Employee monitoring is the use of various methods of workplace surveillance to gather information about the activities and locations of staff members. Monitoring methods include keystroke logging, ... (WhatIs.com)

  • OPSEC (operational security)

    - OPSEC (operational security) is an analytical process that identifies assets such as sensitive corporate information or trade secrets, and determines the controls required to protect these assets. (SearchCompliance.com)

  • Trusted Platform Module (TPM)

    - A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. (WhatIs.com)

Glossaries

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Passwords: Do you speak geek?Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.