SlideShare a Scribd company logo
1 of 20
Two-Factor Authentication (2FA)
By: Christopher Ward-Willis
https://digitogy.com/google-
authenticator-review/
https://doit.umbc.edu/security/?id=76035
https://support.apple.com/en-us/HT205075
What is it?
https://www.netsafe.org.nz/2-factor-authentication/
Why should you use it?
https://www.eff.org/deeplinks/2016/12/12-days-2fa-how-enable-two-factor-authentication-your-online-accounts
https://elie.net/blog/security/how-to-improve-your-online-security-and-privacy-in-10-
easy-steps/
https://whatismyipaddress.com/two-factor-authentication
Central Idea
https://www.borer.co.uk/borer-technology/multi-factor-identity-authentication/
Something you know
https://www.indiatoday.in/technology/features/story/600-million-
facebook-passwords-seen-by-employees-1483906-2019-03-22
https://www.pcworld.com/article/3392860/5-alarming-facts-in-honor-
of-world-password-day.html
https://en.wikipedia.org/wiki/Password
https://www.thesun.co.uk/tech/7978489/worst-passwords-most-
common-2018/
Something you have
https://www.boostmobile.com/phones/apple-
iphone-6s-plus-preowned.html
https://www.verizonwireless.com/smartphones/samsung-
galaxy-s9/
https://guide.duo.com/tokens
Something You Are
http://www.proctorcars.com/biometrics-in-cars-unlocking-your-car-with-a-fingerprint-scanner-to-become-a-standard-feature/
https://www.ifsecglobal.com/global/biometric-security-systems-guide-devices-fingerprint-scanners-facial-recognition/
https://www.azcentral.com/story/money/business/tech/2017/09/22/why-voice-recognition-dictation-software-still-
long-way-go/690595001/
https://newsroom.cisco.com/feature-content?type=webcontent&articleId=1938827
How does it work?
https://www.macrumors.com/how-to/apple-id-two-factor-authentication/
https://duo.com/product/trusted-users/two-factor-authentication
https://www.wpbeginner.com/plugins/improve-wordpress-security-with-google-authenticator/
https://medium.com/@mshelton/two-factor-authentication-for-beginners-b29b0eec07d7
How does it work?
https://www.macrumors.com/how-to/apple-id-two-factor-authentication/
https://www.wpbeginner.com/plugins/improve-wordpress-security-with-google-authenticator/
https://medium.com/@mshelton/two-factor-authentication-for-beginners-b29b0eec07d7
https://duo.com/product/trusted-users/two-factor-authentication
Pros to 2FA
http://ipayguru.com/gold/storage/online-security/
Cons to 2FA
https://www.rd.com/advice/places-you-should-never-keep-your-phone/
https://ting.com/blog/tri-band-lte-now-available-in-17-new-markets/
https://www.infosecurity-magazine.com/magazine-features/hard-soft-or-smart-evaluating-the-two-factor/
Faults of 2FA
https://blog.malwarebytes.com/cybercrime/2018/09/mobile-menace-
monday-sms-phishing-attacks-target-the-job-market/
https://nakedsecurity.sophos.com/2011/04/04/rsa-release-details-on-security-breach/
https://help.myspace.com/hc/en-us/articles/201956084-Forgot-Password
Other Concerns
https://www.howtogeek.com/121875/htg-explains-why-does-windows-8-want-me-to-trust-this-pc/
https://it.cornell.edu/twostep/remember-me-24-hours
How many sites use 2FA?
https://twofactorauth.org
https://instagram-press.com
https://twitter.com/snapchat
https://www.amazon.com
https://www.wowo.com/scammers-target-chase-bank-customers-emails-texts/
Personal Experience
http://www.ciobulletin.com/cyber-security/stockx-data-breach-hack
https://stockx.com
https://www.classaction.org/news/class-action-claims-stockx-failed-to-prevent-attempted-to-cover-up-data-breach
Personal Experience
Personal Experience
Personal Experience
Personal Experience
Sources
 https://www.wired.com/insights/2013/04/five-myths-
of-two-factor-authentication-and-the-reality/
 https://www.cnet.com/news/two-factor-
authentication-what-you-need-to-know-faq/
 https://searchsecurity.techtarget.com/definition/two-
factor-authentication
 https://www.intego.com/mac-security-blog/two-factor-
authentication-how-it-works-and-why-you-should-use-
it/
 https://www.cnet.com/how-to/how-and-why-to-use-
two-factor-authentication/

More Related Content

Similar to 2 fa it101

Similar to 2 fa it101 (20)

Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Open Id
Open IdOpen Id
Open Id
 
Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
"Build digital" reading list
"Build digital" reading list"Build digital" reading list
"Build digital" reading list
 
Hands-on with OAuth, Facebook and the Force.com Platform
Hands-on with OAuth, Facebook and the Force.com PlatformHands-on with OAuth, Facebook and the Force.com Platform
Hands-on with OAuth, Facebook and the Force.com Platform
 
mobile case_presentation_byod_dey_sushmita
 mobile case_presentation_byod_dey_sushmita mobile case_presentation_byod_dey_sushmita
mobile case_presentation_byod_dey_sushmita
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
Blackhat Analyics 4: May the 25th be with you!
Blackhat Analyics 4:  May the 25th be with you!Blackhat Analyics 4:  May the 25th be with you!
Blackhat Analyics 4: May the 25th be with you!
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Beyond what is ORCID... using the API (L. Paglione)
Beyond what is ORCID... using the API (L. Paglione)Beyond what is ORCID... using the API (L. Paglione)
Beyond what is ORCID... using the API (L. Paglione)
 
Transcript
TranscriptTranscript
Transcript
 
Trust at the Interface of Start-up and Enterprise
Trust at the Interface of Start-up and EnterpriseTrust at the Interface of Start-up and Enterprise
Trust at the Interface of Start-up and Enterprise
 
Growth hacks for miva driven businesses
Growth hacks for miva driven businessesGrowth hacks for miva driven businesses
Growth hacks for miva driven businesses
 
Growth hacks for miva driven businesses
Growth hacks for miva driven businessesGrowth hacks for miva driven businesses
Growth hacks for miva driven businesses
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

2 fa it101