Risk-Based Authentication Explained - Balancing Security and User Experience
Offered By: IBM via YouTube
Course Description
Overview
Explore risk-based authentication in this informative 14-minute video from IBM. Discover how cybersecurity systems assess and respond to different levels of risk when authenticating users. Learn about the factors that influence risk assessment, including context and sensitivity of information. Understand how this approach enhances IT security by adapting authentication requirements based on perceived risk levels. Gain insights into the balance between trust and risk in cybersecurity decision-making. Delve into various risk factors and their impact on authentication processes. Access additional resources on data breach costs and AI in cybersecurity through provided links. Sign up for IBM's monthly security newsletter to stay updated on the latest developments in the field.
Syllabus
Intro
Risk vs Trust
Risk Factors
Other Risk Factors
Risk and Sensitivity
Taught by
IBM Technology
Tags
Related Courses
Cybersecurity and Its Ten DomainsUniversity System of Georgia via Coursera Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Computing, Storage and Security with Google Cloud Platform
Google via Coursera