Multi-factor Authentication as Fast As Possible

Techquickie ·Techquickie ·2015-05-07 · 875 words · ~4 min read
Floatplane YouTube

Transcript

JSON SRT VTT 67
0:00 multiactor authentication or MFA is an approach to predicting your logging
0:04 credentials that requires the presentation of two or more of the three
0:10 independent authentication factors a knowledge Factor something only the user
0:14 knows a possession Factor something only the user has and an inherence Factor
0:20 something only the user is the most popular form of multifactor
0:24 authentication is two-factor authentication which is used by online
0:27 services like Gmail and steam the three factors are pretty clearly
0:32 defined knowledge factors include PIN codes personal questions like your
0:35 mother's maiden name passwords and swipe tap or knock patterns like those on
0:41 smartphone lock screens possession factors are physical items like an
0:46 identification card that you would swipe to access secure areas of a building or
0:50 a USB drive with an encryption key on it that decrypts a protected folder on a
0:54 computer though for the most part possession factors are being eliminated
0:58 and replaced by smartphone Fe features and apps making your smartphone your
1:02 possession Factor inherence factors are
1:05 also known as biometric identifiers there are relatively new form of
1:09 authentication and include face recognition fingerprint scans voice
1:13 prints and the ever popular sci-fi friendly Iris and retinal scans now
1:18 there's no doubt that biometric authentication factors are super cool
1:21 and while they're quickly being pushed into the mainstream they're also meeting
1:24 a fair bit of resistance and for good reason one issue is that biometric
1:29 information can be easily repeated once compromised and a second is that many
1:34 individuals object to having their biometric information tracked and stored
1:38 in a database somewhere which seems like a fairly valid concern given the amount
1:42 of secure data that gets compromised on a daily basis and that unlike a password
1:47 you can't run around changing your fingerprints or retinas at least not yet
1:52 so that's what it is but what is it for well better security logging in by
1:57 combining a knowledge Factor like your password with a possession Factor like a
2:01 physical key or a code sent to your smartphone makes your account much more
2:05 difficult to Target for online attacks let's take Gmail's two Factor
2:09 authentication as an example even if a wannabe account hijacker obtains your
2:14 password with a key logger or a security question exploit Google will require the
2:19 entry of a six-digit code that they send to you that must be entered within a
2:23 couple minutes something that hijacker can't get without your smartphone and on
2:28 top of that and we're continuing the GMA example here once someone tries to log
2:32 in with the correct password that notification will go straight to you and
2:36 you'll immediately know that someone is trying to access your account without
2:39 your permission and also that it's probably time to re-evaluate your
2:44 extremely secure password of gayen is love gab Ben his life now there are a
2:48 few reasons why people don't use multiactor authentication some Services
2:51 don't support it some people share accounts with a couple or a business
2:55 partner so they can't both have the same smartphone at the same time to use it
3:00 and then some people just plain can't be ared to add another step to their login
3:04 process but if you truly care about
3:07 keeping your personal data private from prying eyes aside from those with a
3:11 warrant that is then the message here is that it's worth the effort if the
3:15 service doesn't support it maybe you should find one that does if you share
3:19 an email account with your significant other or business partner just get your
3:23 own email they aren't exactly expensive and if you simply don't care well then I
3:28 think you're underestimating what someone with access to your accounts can
3:31 do to you I've been key logged before and multiactor authentication on one of
3:36 my accounts was the only thing that kept me from losing other ones speaking of
3:41 things that you should use multiactor authentication on your linda.com account
3:45 because knowledge is the most valuable of all resources and you need to protect
3:49 it well maybe I'm being a little bit melodramatic but linda.com is an amazing
3:53 resource with thousands of great courses available in their Library you can learn
3:57 Adobe programs pick up some new photograph graphy skills learn about web
4:00 design business or music production or essentially whatever you want to do
4:05 online head over to linda.com and check it out their courses are taught by
4:08 industry experts and they add new ones every week so no matter how much you may
4:12 know already or learn from linda.com there's always something new to check
4:16 out and best of all their service is very affordable with plans starting at
4:19 only 25 bucks a month thanks linda.com
4:22 for sponsoring this episode thanks you guys for watching like the video if you liked it dislike it if you disliked it
4:26 leave a comment letting me know if you have suggestions for future fastest possible videos like this one and as
4:30 always don't forget to subscribe to Techquickie for more videos just like this
4:33 one