YoVDO

Authentication Methods in Security and Network Forensics - Lecture 4

Offered By: Bill Buchanan OBE via YouTube

Tags

Cybersecurity Courses Network Security Courses Biometrics Courses Password Security Courses

Course Description

Overview

Explore authentication principles and methods in this comprehensive lecture from the "Introduction to Security and Network Forensics" book. Delve into key security issues, password management, biometrics, message hashing, and private key authentication. Examine each mark authentication, credibility, and Microsoft Card Space concepts. Understand personal cards, relying parties, and identity providers. Analyze the Card Space analogy and elements of trust. Investigate email encryption and authentication with PGP. Gain valuable insights into security and forensic computing through this in-depth presentation by Prof Bill Buchanan, part of the Security and Forensic Computing module at Edinburgh Napier University.

Syllabus

Intro
Principles of Security
Key Issues
Authentication Methods
Passwords
Biometrics
Message Hash
Private Key Authentication
Each Mark Authentication
Credibility
Microsoft Card Space
Personal Card
Relying Party
Identity Provider
Card Space
Analogy
Element of Trust
Example
Email Encryption
Authentication with PGP


Taught by

Bill Buchanan OBE

Related Courses

Digitale Identitäten - Wer bin ich im Netz?
openHPI
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Security Awareness Training
(ISC)² via Coursera
Learn Social Engineering From Scratch 2024
Udemy
Certified Ethical Hacker دورة إعداد الـ
Udemy