YoVDO

Why Some Multi-Factor Authentication Technology is Irresponsible

Offered By: LASCON via YouTube

Tags

LASCON Courses Multi-Factor Authentication Courses Biometrics Courses

Course Description

Overview

Explore an independent, critical assessment of multi-factor authentication technologies and methods in this 41-minute LASCON conference talk. Gain valuable insights into selecting the best authentication solution for your needs, with over 200 vendors in the market. Learn to identify suboptimal technologies to avoid and arm yourself with essential questions to ask vendors. Discover the importance of rejecting or requesting alternatives for problematic choices in multi-factor authentication products, including 2D fingerprints, QR codes, SMS OTP, and weak account recovery methods. Understand the growing disparity between NIST's definition of multi-factor authentication and newer vendor definitions. Delve into topics such as biometrics adoption, threat models, FIDO Alliance, and IoT predictions. Equip yourself with the knowledge to make informed decisions and contribute to the development of more secure authentication products and services.

Syllabus

Introduction
NIST definition
Why so many vendors
Biometrics adoption
Youre responsible
Biometrics
Threat Models
Dr Future
SMS OTP
Google Authenticator
FIDO Alliance
IOT
Predictions
What can you do


Taught by

LASCON

Related Courses

Access Controls
(ISC)² via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Data Privacy Fundamentals
Northeastern University via Coursera
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
iOS Development: Security
LinkedIn Learning