Zachary blum Sam Garcia Courtney Sullivan

Slides:



Advertisements
Similar presentations
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Advertisements

PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
The Impact of Physical Security on Network Security
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Information Security for Managers (Master MIS)
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Willing to coordinate DS : Access Control Argus: multi-factor authentication Professor Hui Wang, Dr Omar Nibouche Computer Science Research Institute,
Security in Computing Protection in General-Purpose Operating Systems.
Codes & Ciphers Ltd 12 Duncan Road Richmond, Surrey TW9 2JD Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX Impersonation.
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Step 1 Remove the wifi Network which is already connected.
Chris Calderon – February 2016 MIS 534 Information Security Management.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Computer Security Set of slides 8 Dr Alexei Vernitski.
Information Systems Design and Development Security Precautions Computing Science.
PASSWORD SECURITY A Melbourne Athenaeum Library
What Is Tapestry? An Online learning journal system.
Outline The basic authentication problem
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Adding direct links to online archives from your VLE
Instructor Materials Chapter 6 Building a Home Network
Goodbye to Passwords.
3.6 Fundamentals of cyber security
Security Issues.
SECURITY in IT ~Shikhar Agarwal.
Multifactor Authentication
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Office 365 Campaign Background & Overview
Business Risks of Insecure Networks
Working to Keep our Children Safe in a World Filled with Technology
My Settings allows a user to manage their Business Banking personal information and preferences, including: Contact information Username and Password Security.
Passwords.
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Two Way Authentication
Taewan kang, Kevin huangfu
Information Security It Is Your Business
Understanding IDENTITY Assurance
Multifactor Authentication & First Time Login
October is National Cyber Security Awareness Month
smartmail & smartportal: Introducing Two-Factor Authentication
Operating Systems Security
Passwords.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Strong Password Authentication Protocols
CLIENT/SERVER COMPUTING ENVIRONMENT
Using Two Factor Authentication To Secure Users Alan P. Barber
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Passwords.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
LMS – SIBAU (Student LMS Guide)
Technical Integration Guide
Review - week 4 Basic device access security
Authentication Chapter 2.
Multi-Factor Authentication
Password Awareness.
Chapter Goals Discuss the CIA triad
COEN 351 Authentication.
Computer Security (Summary)
Keeping your passwords safe
Getting Started With LastPass Enterprise
Hazelwood Schools Wednesday 2nd October 2019.
NCSA Duo.
Presentation transcript:

Zachary blum Sam Garcia Courtney Sullivan Authentication Zachary blum Sam Garcia Courtney Sullivan

Good Authentication techniques The picture is a link

Types of Authentication Single Factor Two Factor Multi-Factor

Single Factor Simplest of all forms of Authentication Uses one of the three general rules for Authentication Reasonably breakable Picture is a TED Talk Example: password on your computer

Example: Banking & Steam Guard Two Factor (TFA or 2FA) A protection method which uses two types of credentials. Sub-section of multi-factor RSA’s Tokens RSA picture is a video Example: Banking & Steam Guard

Multi-Factor A protection authentication that uses a minimum of two types of credentials. What the user already knows (Such as a password)  A biometric authentication. (Such as a fingerprint or iris scan) Something a user possesses (Such as a mobile device.) Example: Used in extremely high risk areas

PROs and CONs of Multi-Factor Authentication - Adds extra layers of Security - Even if one authentication proves unreliable, another remains - Notifications are sent to users when unusual activity is discovered. CONS: -NOTHING IS EVER 100% SAFE FROM ATTACKERS -User Safety  measures plays a huge role in the protection of the authentication

Other Good Practices Be smart about password selection Don’t save passwords to browser They are encrypted with general username login password Use a Password safe or Manager True Key LastPass Dashlane Be smart and don’t take shortcuts Link is in the fist bullet point