Zachary blum Sam Garcia Courtney Sullivan Authentication Zachary blum Sam Garcia Courtney Sullivan
Good Authentication techniques The picture is a link
Types of Authentication Single Factor Two Factor Multi-Factor
Single Factor Simplest of all forms of Authentication Uses one of the three general rules for Authentication Reasonably breakable Picture is a TED Talk Example: password on your computer
Example: Banking & Steam Guard Two Factor (TFA or 2FA) A protection method which uses two types of credentials. Sub-section of multi-factor RSA’s Tokens RSA picture is a video Example: Banking & Steam Guard
Multi-Factor A protection authentication that uses a minimum of two types of credentials. What the user already knows (Such as a password) A biometric authentication. (Such as a fingerprint or iris scan) Something a user possesses (Such as a mobile device.) Example: Used in extremely high risk areas
PROs and CONs of Multi-Factor Authentication - Adds extra layers of Security - Even if one authentication proves unreliable, another remains - Notifications are sent to users when unusual activity is discovered. CONS: -NOTHING IS EVER 100% SAFE FROM ATTACKERS -User Safety measures plays a huge role in the protection of the authentication
Other Good Practices Be smart about password selection Don’t save passwords to browser They are encrypted with general username login password Use a Password safe or Manager True Key LastPass Dashlane Be smart and don’t take shortcuts Link is in the fist bullet point