SlideShare a Scribd company logo
1 of 21
Sources
• •Slide 1: https://duo.com/ , https://wordpress.org/plugins/duo-wordpress/
• •Slide 2: https://nakedsecurity.sophos.com/2017/06/12/apple-to-auto-update-devices-to-two-factor-authentication/
• •Slide 3: https://thenextweb.com/insider/2017/08/09/study-most-major-websites-have-dreadful-basic-password-security/
• •Slide 4: https://insights.dice.com/2017/12/19/popular-bad-passwords-2017/, https://www.thepeoplepost.com/news/lifestyle/bad-password-
habits-can-compromise-your-sensitive-data
• •Slide 5: https://www.tradesy.com/i/louis-vuitton-gold-single-key-lock-pad-lock-and-key-871100/25845917/
• •Slide 6: https://doubleoctopus.com/security-wiki/authentication/two-factor-authentication/
• •Slide 7: https://support.apple.com/en-us/HT208109
• •Slide 8: https://www.researchgate.net/figure/The-local-location-based-authentication_fig3_268203733
• •Slide 9:https://www.vasco.com/two-factor-authentication.html
• •Slide 10: https://www.123rf.com/photo_33372204_mobile-phones-background-pile-of-different-modern-smartphones-3d.html,
• Slide 11: https://www.yubico.com/2018/03/anatomy-phishing-email-5-things-look-click/
• Slide 12: https://www.phishing.org/hs-fs/hubfs/Phishing/phishing-macboat.jpg?width=300&name=phishing-macboat.jpg, https://images-na.ssl-
images-amazon.com/images/I/61sLzTI3BsL._UY395_.jpg, https://i.ytimg.com/vi/_XRRSmZH7CM/maxresdefault.jpg
• Slide 13: https://e-channelnews.com/wp-content/uploads/2018/05/SecurityHacker2.png,
• Slide 14: https://ca.hikvision.com/sites/default/files/uk_finds_identity_theft_cyber_fraud_grow-blog.png
• Slide 15: https://makeawebsitehub.com/wp-content/uploads/2016/02/learn-code-e1455713167295.jpg
• Slide 16/17: https://upload.wikimedia.org/wikipedia/commons/6/60/O2.svg
• Slide 18: https://akm-img-a-in.tosshub.com/indiatoday/google-apps-thumb-
559_120517104011_0.jpg?ENIc7eh9xZiGz9Zv7PoE4Jr5r0J7dmIk, https://searchengineland.com/figz/wp-content/seloads/2014/10/yahoo-purple-
sign-1920.jpg
• Slide 19: https://s14635.pcdn.co/wp-content/uploads/2014/02/computersafety2014.jpg
• Slide 20: https://www.cloudbric.com/wp-content/uploads/two-factor-authentication-vs-multi-factor-authentication-e1499651509851.png

More Related Content

Similar to Two-Factor Authentication Presentation

Professional develoment
Professional develomentProfessional develoment
Professional develomentjbeans77
 
Internet of things
Internet of thingsInternet of things
Internet of thingsJodie Riek
 
A guide to make KILLER Presentations
A guide to make KILLER PresentationsA guide to make KILLER Presentations
A guide to make KILLER PresentationsSameer Mathur
 
20110406數位出版發展趨勢 雜誌
20110406數位出版發展趨勢 雜誌20110406數位出版發展趨勢 雜誌
20110406數位出版發展趨勢 雜誌Sophie Pang
 
Ransomware Presentation
Ransomware PresentationRansomware Presentation
Ransomware Presentationjpetrocelli528
 
Internet tracking and private browsing
Internet tracking and private browsingInternet tracking and private browsing
Internet tracking and private browsingSvangestel
 
Exercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical IssuesExercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical Issuesclemwj
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Michael Pirnat
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
 
窺探職場上所需之資安專業技術與能力 Tdohconf
窺探職場上所需之資安專業技術與能力 Tdohconf窺探職場上所需之資安專業技術與能力 Tdohconf
窺探職場上所需之資安專業技術與能力 Tdohconfjack51706
 
TED evaluation
TED evaluationTED evaluation
TED evaluationPhenyfox
 
Internet of Things & E-commerce
Internet of Things & E-commerceInternet of Things & E-commerce
Internet of Things & E-commerceAqeel Ahmad
 
Modern Application and Microservices Security from EE6 JASPIC to the EE8 Secu...
Modern Application and Microservices Security from EE6 JASPIC to the EE8 Secu...Modern Application and Microservices Security from EE6 JASPIC to the EE8 Secu...
Modern Application and Microservices Security from EE6 JASPIC to the EE8 Secu...Michael Remijan
 
Listening to social signals to adjust your marketing campaigns
Listening to social signals to adjust your marketing campaignsListening to social signals to adjust your marketing campaigns
Listening to social signals to adjust your marketing campaignsDigital Megaphone
 
Creating Social Media Magic
Creating Social Media MagicCreating Social Media Magic
Creating Social Media Magicmadmoy
 
Wpwp digital tools
Wpwp digital toolsWpwp digital tools
Wpwp digital toolsahalter
 
October 2021 Microsoft 365 Need to Know Webinar
October 2021 Microsoft 365 Need to Know WebinarOctober 2021 Microsoft 365 Need to Know Webinar
October 2021 Microsoft 365 Need to Know WebinarRobert Crane
 
Libraries & cyber security
Libraries & cyber securityLibraries & cyber security
Libraries & cyber securityKevin Martin
 
BSides São Paulo - Trabalho no exterior e segurança de aplicações
BSides São Paulo - Trabalho no exterior e segurança de aplicaçõesBSides São Paulo - Trabalho no exterior e segurança de aplicações
BSides São Paulo - Trabalho no exterior e segurança de aplicaçõesIsmael Goncalves
 

Similar to Two-Factor Authentication Presentation (20)

Professional develoment
Professional develomentProfessional develoment
Professional develoment
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
A guide to make KILLER Presentations
A guide to make KILLER PresentationsA guide to make KILLER Presentations
A guide to make KILLER Presentations
 
20110406數位出版發展趨勢 雜誌
20110406數位出版發展趨勢 雜誌20110406數位出版發展趨勢 雜誌
20110406數位出版發展趨勢 雜誌
 
Ransomware Presentation
Ransomware PresentationRansomware Presentation
Ransomware Presentation
 
Internet tracking and private browsing
Internet tracking and private browsingInternet tracking and private browsing
Internet tracking and private browsing
 
Exercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical IssuesExercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical Issues
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
窺探職場上所需之資安專業技術與能力 Tdohconf
窺探職場上所需之資安專業技術與能力 Tdohconf窺探職場上所需之資安專業技術與能力 Tdohconf
窺探職場上所需之資安專業技術與能力 Tdohconf
 
Typing lessons
Typing lessonsTyping lessons
Typing lessons
 
TED evaluation
TED evaluationTED evaluation
TED evaluation
 
Internet of Things & E-commerce
Internet of Things & E-commerceInternet of Things & E-commerce
Internet of Things & E-commerce
 
Modern Application and Microservices Security from EE6 JASPIC to the EE8 Secu...
Modern Application and Microservices Security from EE6 JASPIC to the EE8 Secu...Modern Application and Microservices Security from EE6 JASPIC to the EE8 Secu...
Modern Application and Microservices Security from EE6 JASPIC to the EE8 Secu...
 
Listening to social signals to adjust your marketing campaigns
Listening to social signals to adjust your marketing campaignsListening to social signals to adjust your marketing campaigns
Listening to social signals to adjust your marketing campaigns
 
Creating Social Media Magic
Creating Social Media MagicCreating Social Media Magic
Creating Social Media Magic
 
Wpwp digital tools
Wpwp digital toolsWpwp digital tools
Wpwp digital tools
 
October 2021 Microsoft 365 Need to Know Webinar
October 2021 Microsoft 365 Need to Know WebinarOctober 2021 Microsoft 365 Need to Know Webinar
October 2021 Microsoft 365 Need to Know Webinar
 
Libraries & cyber security
Libraries & cyber securityLibraries & cyber security
Libraries & cyber security
 
BSides São Paulo - Trabalho no exterior e segurança de aplicações
BSides São Paulo - Trabalho no exterior e segurança de aplicaçõesBSides São Paulo - Trabalho no exterior e segurança de aplicações
BSides São Paulo - Trabalho no exterior e segurança de aplicações
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Two-Factor Authentication Presentation

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Sources • •Slide 1: https://duo.com/ , https://wordpress.org/plugins/duo-wordpress/ • •Slide 2: https://nakedsecurity.sophos.com/2017/06/12/apple-to-auto-update-devices-to-two-factor-authentication/ • •Slide 3: https://thenextweb.com/insider/2017/08/09/study-most-major-websites-have-dreadful-basic-password-security/ • •Slide 4: https://insights.dice.com/2017/12/19/popular-bad-passwords-2017/, https://www.thepeoplepost.com/news/lifestyle/bad-password- habits-can-compromise-your-sensitive-data • •Slide 5: https://www.tradesy.com/i/louis-vuitton-gold-single-key-lock-pad-lock-and-key-871100/25845917/ • •Slide 6: https://doubleoctopus.com/security-wiki/authentication/two-factor-authentication/ • •Slide 7: https://support.apple.com/en-us/HT208109 • •Slide 8: https://www.researchgate.net/figure/The-local-location-based-authentication_fig3_268203733 • •Slide 9:https://www.vasco.com/two-factor-authentication.html • •Slide 10: https://www.123rf.com/photo_33372204_mobile-phones-background-pile-of-different-modern-smartphones-3d.html, • Slide 11: https://www.yubico.com/2018/03/anatomy-phishing-email-5-things-look-click/ • Slide 12: https://www.phishing.org/hs-fs/hubfs/Phishing/phishing-macboat.jpg?width=300&name=phishing-macboat.jpg, https://images-na.ssl- images-amazon.com/images/I/61sLzTI3BsL._UY395_.jpg, https://i.ytimg.com/vi/_XRRSmZH7CM/maxresdefault.jpg • Slide 13: https://e-channelnews.com/wp-content/uploads/2018/05/SecurityHacker2.png, • Slide 14: https://ca.hikvision.com/sites/default/files/uk_finds_identity_theft_cyber_fraud_grow-blog.png • Slide 15: https://makeawebsitehub.com/wp-content/uploads/2016/02/learn-code-e1455713167295.jpg • Slide 16/17: https://upload.wikimedia.org/wikipedia/commons/6/60/O2.svg • Slide 18: https://akm-img-a-in.tosshub.com/indiatoday/google-apps-thumb- 559_120517104011_0.jpg?ENIc7eh9xZiGz9Zv7PoE4Jr5r0J7dmIk, https://searchengineland.com/figz/wp-content/seloads/2014/10/yahoo-purple- sign-1920.jpg • Slide 19: https://s14635.pcdn.co/wp-content/uploads/2014/02/computersafety2014.jpg • Slide 20: https://www.cloudbric.com/wp-content/uploads/two-factor-authentication-vs-multi-factor-authentication-e1499651509851.png