Security for the People - End User Authentication Security on the Internet - Lecture 13
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Security Is A Process, Not A Product.
Primary Data Points Utilized
Gathering Data Can Be Really. Really Annoying
Two Factor Deployments Per Year Since 2005
How Does A User Actually Enroll in Two Factor?
Collective Method Availability Across Services
Companies Should Point Out Two Factor Availability
Two Factor Moniker Usage Since 2005
Built-in Two Factor Bypass? Recovery Gone Wrong.
Browser Security Features For Service Logins
Browser Security All-Stars
SSL/TLS Implementation for Service Logins
Browser Security + SSL Security All-Stars 2 of 141 services utilized all of tested browser security features and managed to receive an 'A+'SSL implementation rating
Security Pages - Yes. Really : Marty companies dedicate an entire page (or at least a big section of a page) to how they protect you and how you can protect yourself ...and others definitely do not.
Mark's Authentication Security Scoring Algorithm - Crudely Realized Edition
How Do We Get a Composite MASSACRE Score? SSL Implementation Browser Security Features
Professional MASSACRE Scale
MASSACRE Scoring Outcomes - Best and Worst! Best Scores
How Do Security Features increase MASSACRE Scores? Overall Values
Have A Crappy Algorithm? Make A Crappy Extension
Breaches of Service Security (Data Loss, Especially)
Random Thoughts On Lessons Learned • scouring the internet to find release dates and documentation for service features is way harder than it should be
All Donel Questions?
Related Courses
Teaching Impacts of Technology: Global SocietyUniversity of California, San Diego via Coursera Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn ASP.NET MVC 5 Identity: Authentication and Authorization
LinkedIn Learning Learning Computer Security and Internet Safety
LinkedIn Learning Learning Mobile Device Security
LinkedIn Learning