Security for the People - End User Authentication Security on the Internet - Lecture 13
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
Security Is A Process, Not A Product.
Primary Data Points Utilized
Gathering Data Can Be Really. Really Annoying
Two Factor Deployments Per Year Since 2005
How Does A User Actually Enroll in Two Factor?
Collective Method Availability Across Services
Companies Should Point Out Two Factor Availability
Two Factor Moniker Usage Since 2005
Built-in Two Factor Bypass? Recovery Gone Wrong.
Browser Security Features For Service Logins
Browser Security All-Stars
SSL/TLS Implementation for Service Logins
Browser Security + SSL Security All-Stars 2 of 141 services utilized all of tested browser security features and managed to receive an 'A+'SSL implementation rating
Security Pages - Yes. Really : Marty companies dedicate an entire page (or at least a big section of a page) to how they protect you and how you can protect yourself ...and others definitely do not.
Mark's Authentication Security Scoring Algorithm - Crudely Realized Edition
How Do We Get a Composite MASSACRE Score? SSL Implementation Browser Security Features
Professional MASSACRE Scale
MASSACRE Scoring Outcomes - Best and Worst! Best Scores
How Do Security Features increase MASSACRE Scores? Overall Values
Have A Crappy Algorithm? Make A Crappy Extension
Breaches of Service Security (Data Loss, Especially)
Random Thoughts On Lessons Learned • scouring the internet to find release dates and documentation for service features is way harder than it should be
All Donel Questions?
Related Courses
Cyber Threats and Attack VectorsUniversity of Colorado System via Coursera Cybersecurity in Healthcare (Hospitals & Care Centres)
Erasmus University Rotterdam via Coursera Information Security Operations Center ISOC for Non-Techies
Udemy Cloud Data Security
University of Minnesota via Coursera Network Security Basics
Pluralsight