Why Some Multi-Factor Authentication Technology is Irresponsible
Offered By: LASCON via YouTube
Course Description
Overview
Explore an independent, critical assessment of multi-factor authentication technologies and methods in this 41-minute LASCON conference talk. Gain valuable insights into selecting the best authentication solution for your needs, with over 200 vendors in the market. Learn to identify suboptimal technologies to avoid and arm yourself with essential questions to ask vendors. Discover the importance of rejecting or requesting alternatives for problematic choices in multi-factor authentication products, including 2D fingerprints, QR codes, SMS OTP, and weak account recovery methods. Understand the growing disparity between NIST's definition of multi-factor authentication and newer vendor definitions. Delve into topics such as biometrics adoption, threat models, FIDO Alliance, and IoT predictions. Equip yourself with the knowledge to make informed decisions and contribute to the development of more secure authentication products and services.
Syllabus
Introduction
NIST definition
Why so many vendors
Biometrics adoption
Youre responsible
Biometrics
Threat Models
Dr Future
SMS OTP
Google Authenticator
FIDO Alliance
IOT
Predictions
What can you do
Taught by
LASCON
Related Courses
Access Controls(ISC)² via Coursera Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn Data Privacy Fundamentals
Northeastern University via Coursera The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy iOS Development: Security
LinkedIn Learning