1
00:00:00,160 --> 00:00:06,560
multiactor authentication or MFA is an approach to predicting your logging

2
00:00:04,759 --> 00:00:12,719
credentials that requires the presentation of two or more of the three

3
00:00:10,160 --> 00:00:17,480
independent authentication factors a knowledge Factor something only the user

4
00:00:14,719 --> 00:00:23,119
knows a possession Factor something only the user has and an inherence Factor

5
00:00:20,600 --> 00:00:26,000
something only the user is the most popular form of multifactor

6
00:00:24,400 --> 00:00:30,560
authentication is two-factor authentication which is used by online

7
00:00:27,840 --> 00:00:34,320
services like Gmail and steam the three factors are pretty clearly

8
00:00:32,239 --> 00:00:38,840
defined knowledge factors include PIN codes personal questions like your

9
00:00:35,960 --> 00:00:43,559
mother's maiden name passwords and swipe tap or knock patterns like those on

10
00:00:41,360 --> 00:00:48,559
smartphone lock screens possession factors are physical items like an

11
00:00:46,079 --> 00:00:52,840
identification card that you would swipe to access secure areas of a building or

12
00:00:50,840 --> 00:00:56,239
a USB drive with an encryption key on it that decrypts a protected folder on a

13
00:00:54,520 --> 00:01:00,160
computer though for the most part possession factors are being eliminated

14
00:00:58,079 --> 00:01:05,080
and replaced by smartphone Fe features and apps making your smartphone your

15
00:01:02,039 --> 00:01:07,880
possession Factor inherence factors are

16
00:01:05,080 --> 00:01:10,920
also known as biometric identifiers there are relatively new form of

17
00:01:09,400 --> 00:01:15,200
authentication and include face recognition fingerprint scans voice

18
00:01:13,080 --> 00:01:19,560
prints and the ever popular sci-fi friendly Iris and retinal scans now

19
00:01:18,080 --> 00:01:22,880
there's no doubt that biometric authentication factors are super cool

20
00:01:21,640 --> 00:01:26,840
and while they're quickly being pushed into the mainstream they're also meeting

21
00:01:24,880 --> 00:01:31,600
a fair bit of resistance and for good reason one issue is that biometric

22
00:01:29,079 --> 00:01:36,399
information can be easily repeated once compromised and a second is that many

23
00:01:34,320 --> 00:01:40,479
individuals object to having their biometric information tracked and stored

24
00:01:38,360 --> 00:01:44,719
in a database somewhere which seems like a fairly valid concern given the amount

25
00:01:42,240 --> 00:01:48,600
of secure data that gets compromised on a daily basis and that unlike a password

26
00:01:47,240 --> 00:01:55,000
you can't run around changing your fingerprints or retinas at least not yet

27
00:01:52,360 --> 00:01:59,240
so that's what it is but what is it for well better security logging in by

28
00:01:57,200 --> 00:02:03,200
combining a knowledge Factor like your password with a possession Factor like a

29
00:02:01,560 --> 00:02:08,039
physical key or a code sent to your smartphone makes your account much more

30
00:02:05,960 --> 00:02:12,080
difficult to Target for online attacks let's take Gmail's two Factor

31
00:02:09,640 --> 00:02:16,760
authentication as an example even if a wannabe account hijacker obtains your

32
00:02:14,239 --> 00:02:21,480
password with a key logger or a security question exploit Google will require the

33
00:02:19,519 --> 00:02:25,440
entry of a six-digit code that they send to you that must be entered within a

34
00:02:23,200 --> 00:02:30,040
couple minutes something that hijacker can't get without your smartphone and on

35
00:02:28,080 --> 00:02:33,920
top of that and we're continuing the GMA example here once someone tries to log

36
00:02:32,200 --> 00:02:38,040
in with the correct password that notification will go straight to you and

37
00:02:36,080 --> 00:02:41,840
you'll immediately know that someone is trying to access your account without

38
00:02:39,760 --> 00:02:45,840
your permission and also that it's probably time to re-evaluate your

39
00:02:44,000 --> 00:02:49,879
extremely secure password of gayen is love gab Ben his life now there are a

40
00:02:48,239 --> 00:02:53,920
few reasons why people don't use multiactor authentication some Services

41
00:02:51,920 --> 00:02:58,239
don't support it some people share accounts with a couple or a business

42
00:02:55,760 --> 00:03:02,000
partner so they can't both have the same smartphone at the same time to use it

43
00:03:00,040 --> 00:03:07,319
and then some people just plain can't be ared to add another step to their login

44
00:03:04,120 --> 00:03:09,440
process but if you truly care about

45
00:03:07,319 --> 00:03:13,799
keeping your personal data private from prying eyes aside from those with a

46
00:03:11,519 --> 00:03:17,519
warrant that is then the message here is that it's worth the effort if the

47
00:03:15,720 --> 00:03:20,920
service doesn't support it maybe you should find one that does if you share

48
00:03:19,400 --> 00:03:26,080
an email account with your significant other or business partner just get your

49
00:03:23,159 --> 00:03:29,879
own email they aren't exactly expensive and if you simply don't care well then I

50
00:03:28,239 --> 00:03:34,360
think you're underestimating what someone with access to your accounts can

51
00:03:31,920 --> 00:03:38,120
do to you I've been key logged before and multiactor authentication on one of

52
00:03:36,239 --> 00:03:43,239
my accounts was the only thing that kept me from losing other ones speaking of

53
00:03:41,159 --> 00:03:47,680
things that you should use multiactor authentication on your linda.com account

54
00:03:45,799 --> 00:03:51,280
because knowledge is the most valuable of all resources and you need to protect

55
00:03:49,599 --> 00:03:55,560
it well maybe I'm being a little bit melodramatic but linda.com is an amazing

56
00:03:53,879 --> 00:03:59,280
resource with thousands of great courses available in their Library you can learn

57
00:03:57,480 --> 00:04:02,720
Adobe programs pick up some new photograph graphy skills learn about web

58
00:04:00,920 --> 00:04:07,319
design business or music production or essentially whatever you want to do

59
00:04:05,000 --> 00:04:10,760
online head over to linda.com and check it out their courses are taught by

60
00:04:08,879 --> 00:04:14,640
industry experts and they add new ones every week so no matter how much you may

61
00:04:12,840 --> 00:04:17,919
know already or learn from linda.com there's always something new to check

62
00:04:16,160 --> 00:04:22,400
out and best of all their service is very affordable with plans starting at

63
00:04:19,400 --> 00:04:23,800
only 25 bucks a month thanks linda.com

64
00:04:22,400 --> 00:04:27,360
for sponsoring this episode thanks you guys for watching like the video if you liked it dislike it if you disliked it

65
00:04:26,320 --> 00:04:31,919
leave a comment letting me know if you have suggestions for future fastest possible videos like this one and as

66
00:04:30,160 --> 00:04:36,479
always don't forget to subscribe to Techquickie for more videos just like this

67
00:04:33,639 --> 00:04:36,479
one
