From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Multifactor authentication
From the course: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Multifactor authentication
- [Instructor] In the last video, you learned how digital systems offer many different authentication techniques that allow users to prove their identity. The three major recognized authentication factors are something you know, such as a password, something you are, such as a fingerprint, and something you have, such as a smartphone. When used alone, any one of these techniques provides some security for systems. However, they each have their own drawbacks. For example, an attacker might steal a user's password through a phishing attack. Once they have the password, they can then use that password to assume the user's identity. Other authentication factors aren't foolproof either. If you use smart card authentication to implement something you have, the user may lose the smart card. Someone coming across it may then use it to impersonate the user. The solution to this problem is to combine authentication techniques…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (Locked) Authentication factors3m 28s
- (Locked) Multifactor authentication2m 35s
- (Locked) Something you have3m 15s
- (Locked) Password authentication protocols3m 10s
- (Locked) SSO and federation3m 34s
- (Locked) Internetwork trust architectures2m 5s
- (Locked) Third-party connections2m 28s
- (Locked) Zero-trust network architectures3m 51s
- (Locked) SAML2m 35s
- (Locked) OAuth and OpenID Connect2m 51s
- (Locked) Device authentication6m 48s
- (Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-