Multi-factor Authentication as Fast As Possible
Techquickie
·Techquickie
·2015-05-07
·
875 words · ~4 min read
0:00
multiactor authentication or MFA is an approach to predicting your logging
0:04
credentials that requires the presentation of two or more of the three
0:10
independent authentication factors a knowledge Factor something only the user
0:14
knows a possession Factor something only the user has and an inherence Factor
0:20
something only the user is the most popular form of multifactor
0:24
authentication is two-factor authentication which is used by online
0:27
services like Gmail and steam the three factors are pretty clearly
0:32
defined knowledge factors include PIN codes personal questions like your
0:35
mother's maiden name passwords and swipe tap or knock patterns like those on
0:41
smartphone lock screens possession factors are physical items like an
0:46
identification card that you would swipe to access secure areas of a building or
0:50
a USB drive with an encryption key on it that decrypts a protected folder on a
0:54
computer though for the most part possession factors are being eliminated
0:58
and replaced by smartphone Fe features and apps making your smartphone your
1:02
possession Factor inherence factors are
1:05
also known as biometric identifiers there are relatively new form of
1:09
authentication and include face recognition fingerprint scans voice
1:13
prints and the ever popular sci-fi friendly Iris and retinal scans now
1:18
there's no doubt that biometric authentication factors are super cool
1:21
and while they're quickly being pushed into the mainstream they're also meeting
1:24
a fair bit of resistance and for good reason one issue is that biometric
1:29
information can be easily repeated once compromised and a second is that many
1:34
individuals object to having their biometric information tracked and stored
1:38
in a database somewhere which seems like a fairly valid concern given the amount
1:42
of secure data that gets compromised on a daily basis and that unlike a password
1:47
you can't run around changing your fingerprints or retinas at least not yet
1:52
so that's what it is but what is it for well better security logging in by
1:57
combining a knowledge Factor like your password with a possession Factor like a
2:01
physical key or a code sent to your smartphone makes your account much more
2:05
difficult to Target for online attacks let's take Gmail's two Factor
2:09
authentication as an example even if a wannabe account hijacker obtains your
2:14
password with a key logger or a security question exploit Google will require the
2:19
entry of a six-digit code that they send to you that must be entered within a
2:23
couple minutes something that hijacker can't get without your smartphone and on
2:28
top of that and we're continuing the GMA example here once someone tries to log
2:32
in with the correct password that notification will go straight to you and
2:36
you'll immediately know that someone is trying to access your account without
2:39
your permission and also that it's probably time to re-evaluate your
2:44
extremely secure password of gayen is love gab Ben his life now there are a
2:48
few reasons why people don't use multiactor authentication some Services
2:51
don't support it some people share accounts with a couple or a business
2:55
partner so they can't both have the same smartphone at the same time to use it
3:00
and then some people just plain can't be ared to add another step to their login
3:04
process but if you truly care about
3:07
keeping your personal data private from prying eyes aside from those with a
3:11
warrant that is then the message here is that it's worth the effort if the
3:15
service doesn't support it maybe you should find one that does if you share
3:19
an email account with your significant other or business partner just get your
3:23
own email they aren't exactly expensive and if you simply don't care well then I
3:28
think you're underestimating what someone with access to your accounts can
3:31
do to you I've been key logged before and multiactor authentication on one of
3:36
my accounts was the only thing that kept me from losing other ones speaking of
3:41
things that you should use multiactor authentication on your linda.com account
3:45
because knowledge is the most valuable of all resources and you need to protect
3:49
it well maybe I'm being a little bit melodramatic but linda.com is an amazing
3:53
resource with thousands of great courses available in their Library you can learn
3:57
Adobe programs pick up some new photograph graphy skills learn about web
4:00
design business or music production or essentially whatever you want to do
4:05
online head over to linda.com and check it out their courses are taught by
4:08
industry experts and they add new ones every week so no matter how much you may
4:12
know already or learn from linda.com there's always something new to check
4:16
out and best of all their service is very affordable with plans starting at
4:19
only 25 bucks a month thanks linda.com
4:22
for sponsoring this episode thanks you guys for watching like the video if you liked it dislike it if you disliked it
4:26
leave a comment letting me know if you have suggestions for future fastest possible videos like this one and as
4:30
always don't forget to subscribe to Techquickie for more videos just like this
4:33
one