Presentation is loading. Please wait.

Presentation is loading. Please wait.

Zachary blum Sam Garcia Courtney Sullivan

Similar presentations


Presentation on theme: "Zachary blum Sam Garcia Courtney Sullivan"— Presentation transcript:

1 Zachary blum Sam Garcia Courtney Sullivan
Authentication Zachary blum Sam Garcia Courtney Sullivan

2 Good Authentication techniques
The picture is a link

3 Types of Authentication
Single Factor Two Factor Multi-Factor

4 Single Factor Simplest of all forms of Authentication
Uses one of the three general rules for Authentication Reasonably breakable Picture is a TED Talk Example: password on your computer

5 Example: Banking & Steam Guard
Two Factor (TFA or 2FA) A protection method which uses two types of credentials. Sub-section of multi-factor RSA’s Tokens RSA picture is a video Example: Banking & Steam Guard

6 Multi-Factor A protection authentication that uses a minimum of two types of credentials. What the user already knows (Such as a password)  A biometric authentication. (Such as a fingerprint or iris scan) Something a user possesses (Such as a mobile device.) Example: Used in extremely high risk areas

7 PROs and CONs of Multi-Factor Authentication
- Adds extra layers of Security - Even if one authentication proves unreliable, another remains - Notifications are sent to users when unusual activity is discovered. CONS: -NOTHING IS EVER 100% SAFE FROM ATTACKERS -User Safety  measures plays a huge role in the protection of the authentication

8 Other Good Practices Be smart about password selection
Don’t save passwords to browser They are encrypted with general username login password Use a Password safe or Manager True Key LastPass Dashlane Be smart and don’t take shortcuts Link is in the fist bullet point


Download ppt "Zachary blum Sam Garcia Courtney Sullivan"

Similar presentations


Ads by Google