Download presentation
Presentation is loading. Please wait.
1
Zachary blum Sam Garcia Courtney Sullivan
Authentication Zachary blum Sam Garcia Courtney Sullivan
2
Good Authentication techniques
The picture is a link
3
Types of Authentication
Single Factor Two Factor Multi-Factor
4
Single Factor Simplest of all forms of Authentication
Uses one of the three general rules for Authentication Reasonably breakable Picture is a TED Talk Example: password on your computer
5
Example: Banking & Steam Guard
Two Factor (TFA or 2FA) A protection method which uses two types of credentials. Sub-section of multi-factor RSA’s Tokens RSA picture is a video Example: Banking & Steam Guard
6
Multi-Factor A protection authentication that uses a minimum of two types of credentials. What the user already knows (Such as a password) A biometric authentication. (Such as a fingerprint or iris scan) Something a user possesses (Such as a mobile device.) Example: Used in extremely high risk areas
7
PROs and CONs of Multi-Factor Authentication
- Adds extra layers of Security - Even if one authentication proves unreliable, another remains - Notifications are sent to users when unusual activity is discovered. CONS: -NOTHING IS EVER 100% SAFE FROM ATTACKERS -User Safety measures plays a huge role in the protection of the authentication
8
Other Good Practices Be smart about password selection
Don’t save passwords to browser They are encrypted with general username login password Use a Password safe or Manager True Key LastPass Dashlane Be smart and don’t take shortcuts Link is in the fist bullet point
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.