SlideShare a Scribd company logo
1 of 21
CYBER SECURITY
CYBER
SECURITY
CYBER: RELATED TO THE CULTURE OF COMPUTERS , IT AND VIRTUAL
REALITY.
SECURITY: STATE OF BEING FREE FROM WORRIES
CYBER SECURITY (in short) :
Protection of computers &
other technological devices like data,
networks ,servers etc.
Formal definition:
It is a process designed to protect
networks and networking devices from attack
,damage or unauthorized access.
CYBER SPACE:
A place that is not real, where electronic messages
exist while they are being sent from one computer to another.
o Comparatively data is less secured in cyberspace and can be
stole easily.
o Thus minimal technical skills are enough to steal data.
 Three main aspects of cyber security are:
Unauthorized access
Unauthorized deletion
Unauthorized modification
•Authentication is the process of verifying the
identity of a person or device.
•Authentication is the process that determines
whether users are who they claim to be.
•Authentication is often followed by
authorization..
 It is a security mechanism used to determine user
privileges or access levels, related to system resources.
 Authorization is the process that determines what
users can and cannot access.
 Authorization is often preceded by authentication.
E.g.: The password verification step in opening a mail is
authentication and if the password, that you entered
happens to be correct , you will be authorized to
access the mails.
 Cyber security is divided into :
Network security(module-3)
Application security(module-3)
Disaster recovery(module-5)
Operation security(module-5) and
Information security
CYBER SECURITY:
(i)To protect the resources(data and devices) from
attacks in cyberspace.
(ii)Concerned with analyzing attacks and framing
security measures, to prevent such attacks in future.
INFORMATION SECURITY:
(i)To protect data from any sort of threats.
(ii)Prioritizes data first rather than concerning
attacks.
 In 2019, effects of cyber crimes have cost $2trillion which in 2021,
would be $6trillion.
 The more secured your system is, the lesser is the risk.
 If you have a secured system you won’t be an easy target for an
attacker.
CONFIDENTIALITY: (privacy)
It is the security principle or set of rules
that control access to information.
Integrity: (correctness, accuracy, consistency)
(i)Maintaining the accuracy and consistency of
data over its entire lifetime.
(ii)Unauthorized modifications should not occur.
Availability:
Ability of the user to access information or
resources in the correct format as and when they
need them.
3)TERMINOLOGIES IN CYBER SECURITY
4) WHAT IS HACKING?
TERMINOLOGIES IN CYBER SECURITY
1.CYBER ATTACK
2.CYBER THREATS
3.EXPLOIT
4.VULNERABILITY
5.DATABREACH
6.PATCH
7.MITIGATION
8.CAPTCHA
9.AUTHENTICATION
CAPTCHA:
 A computer program or system intended to
distinguish human from machine input.
 CAPTCHA is an acronym that stands for
"Completely Automated Public Turing test to
tell Computers and Humans Apart .“
 A computer program such as a bot will be unable
to interpret the distorted letters, while a human
being can interpret them.
CYBER ATTACK:
CYBER THREATS:
A cyber attack is an assault launched by cybercriminals
using one or more computers against a single or
multiple computers or networks.
Cyber threats are malicious attempts to cause
disruptions to a computer system or network by stealing
valuable data or accessing unauthorized files.
EXPLOIT:
VULNERABILITY:
An exploit is a piece of software, a chunk of data, or a
sequence of commands that takes advantage of a
vulnerability to cause damage.
( to use something to one’s own advantage)
Vulnerability is a weakness which can be exploited by
a threat actor, such as an attacker, to perform
unauthorized actions.
MITIGATION:
DATA BREACH:
PATCH:
Data breach is a confirmed incident in which sensitive,
confidential or protected data has been accessed and/or
disclosed in an unauthorized fashion .
Threat Mitigation refers to the policies or the processes used to,
lessen the extent of a damage , when security attacks happen.
A patch is a small piece of software that a company issues
whenever a security flaw is uncovered.
AUTHENTICATION
VALIDATING OR VERIFYING AN IDENTITY OF A
USER BEFORE ALLOWING ACCESS.
TWO PHASES:
 IDENTIFICATION
 ACTUAL AUTHENTICATION
IDENTIFICATION – THE USER ID YOU ENTER.
ACTUAL AUTHENTICATION – PASSWORD OR PIN
 It is a security process in which users provide two
different authentication factors to verify themselves.
 Two-factor authentication methods rely on a user
providing a password, as well as a second factor,
usually either a security token
 80% of data breaches can be prevented by 2FA.
 Less than 10% of users adopted 2FA over the course
of over 7 years.
TWO FACTOR AUTHENTICATION
MFA: IT IS THE MOST SOPHISTICATED AUTHENTICATION METHOD THAT
USES 2 OR MORE INDEPENDENT FACTORS TO GRANT USER ACCESS TO A
SYSTEM.
 Something you know - a password or a pin
 Something you have - mobile phone or a security token
 Something you are - fingerprint or Face ID
 Something you do - typing speed, locational information
MULTI FACTOR AUTHENTICATION

More Related Content

Similar to Cyber Security Protection

information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysisdadkhah077
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPiBits
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.Ni
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And PrivacyTodd Turner
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 

Similar to Cyber Security Protection (20)

information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An AnalysisSecurity Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Aspects of Network Security
Aspects of Network SecurityAspects of Network Security
Aspects of Network Security
 
PPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptxPPT0-Computer Security Concepts.pptx
PPT0-Computer Security Concepts.pptx
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.INFORMATION SECURITY: THREATS AND SOLUTIONS.
INFORMATION SECURITY: THREATS AND SOLUTIONS.
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
System Security
System SecuritySystem Security
System Security
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And Privacy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from Godwin585235

digita circuit design.pptx
digita circuit design.pptxdigita circuit design.pptx
digita circuit design.pptxGodwin585235
 
ROBOTICS APPLICATIONS.pptx
ROBOTICS APPLICATIONS.pptxROBOTICS APPLICATIONS.pptx
ROBOTICS APPLICATIONS.pptxGodwin585235
 
Presentation On Machine Learning.pptx
Presentation  On Machine Learning.pptxPresentation  On Machine Learning.pptx
Presentation On Machine Learning.pptxGodwin585235
 

More from Godwin585235 (6)

digita circuit design.pptx
digita circuit design.pptxdigita circuit design.pptx
digita circuit design.pptx
 
java01.ppt
java01.pptjava01.ppt
java01.ppt
 
PCB Tutorial.pptx
PCB Tutorial.pptxPCB Tutorial.pptx
PCB Tutorial.pptx
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
ROBOTICS APPLICATIONS.pptx
ROBOTICS APPLICATIONS.pptxROBOTICS APPLICATIONS.pptx
ROBOTICS APPLICATIONS.pptx
 
Presentation On Machine Learning.pptx
Presentation  On Machine Learning.pptxPresentation  On Machine Learning.pptx
Presentation On Machine Learning.pptx
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Cyber Security Protection

  • 1.
  • 2. CYBER SECURITY CYBER SECURITY CYBER: RELATED TO THE CULTURE OF COMPUTERS , IT AND VIRTUAL REALITY. SECURITY: STATE OF BEING FREE FROM WORRIES
  • 3. CYBER SECURITY (in short) : Protection of computers & other technological devices like data, networks ,servers etc. Formal definition: It is a process designed to protect networks and networking devices from attack ,damage or unauthorized access.
  • 4. CYBER SPACE: A place that is not real, where electronic messages exist while they are being sent from one computer to another. o Comparatively data is less secured in cyberspace and can be stole easily. o Thus minimal technical skills are enough to steal data.
  • 5.  Three main aspects of cyber security are: Unauthorized access Unauthorized deletion Unauthorized modification
  • 6. •Authentication is the process of verifying the identity of a person or device. •Authentication is the process that determines whether users are who they claim to be. •Authentication is often followed by authorization..
  • 7.  It is a security mechanism used to determine user privileges or access levels, related to system resources.  Authorization is the process that determines what users can and cannot access.  Authorization is often preceded by authentication. E.g.: The password verification step in opening a mail is authentication and if the password, that you entered happens to be correct , you will be authorized to access the mails.
  • 8.  Cyber security is divided into : Network security(module-3) Application security(module-3) Disaster recovery(module-5) Operation security(module-5) and Information security
  • 9. CYBER SECURITY: (i)To protect the resources(data and devices) from attacks in cyberspace. (ii)Concerned with analyzing attacks and framing security measures, to prevent such attacks in future. INFORMATION SECURITY: (i)To protect data from any sort of threats. (ii)Prioritizes data first rather than concerning attacks.
  • 10.  In 2019, effects of cyber crimes have cost $2trillion which in 2021, would be $6trillion.  The more secured your system is, the lesser is the risk.  If you have a secured system you won’t be an easy target for an attacker.
  • 11.
  • 12. CONFIDENTIALITY: (privacy) It is the security principle or set of rules that control access to information. Integrity: (correctness, accuracy, consistency) (i)Maintaining the accuracy and consistency of data over its entire lifetime. (ii)Unauthorized modifications should not occur. Availability: Ability of the user to access information or resources in the correct format as and when they need them.
  • 13. 3)TERMINOLOGIES IN CYBER SECURITY 4) WHAT IS HACKING?
  • 14. TERMINOLOGIES IN CYBER SECURITY 1.CYBER ATTACK 2.CYBER THREATS 3.EXPLOIT 4.VULNERABILITY 5.DATABREACH 6.PATCH 7.MITIGATION 8.CAPTCHA 9.AUTHENTICATION
  • 15. CAPTCHA:  A computer program or system intended to distinguish human from machine input.  CAPTCHA is an acronym that stands for "Completely Automated Public Turing test to tell Computers and Humans Apart .“  A computer program such as a bot will be unable to interpret the distorted letters, while a human being can interpret them.
  • 16. CYBER ATTACK: CYBER THREATS: A cyber attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. Cyber threats are malicious attempts to cause disruptions to a computer system or network by stealing valuable data or accessing unauthorized files.
  • 17. EXPLOIT: VULNERABILITY: An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a vulnerability to cause damage. ( to use something to one’s own advantage) Vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions.
  • 18. MITIGATION: DATA BREACH: PATCH: Data breach is a confirmed incident in which sensitive, confidential or protected data has been accessed and/or disclosed in an unauthorized fashion . Threat Mitigation refers to the policies or the processes used to, lessen the extent of a damage , when security attacks happen. A patch is a small piece of software that a company issues whenever a security flaw is uncovered.
  • 19. AUTHENTICATION VALIDATING OR VERIFYING AN IDENTITY OF A USER BEFORE ALLOWING ACCESS. TWO PHASES:  IDENTIFICATION  ACTUAL AUTHENTICATION IDENTIFICATION – THE USER ID YOU ENTER. ACTUAL AUTHENTICATION – PASSWORD OR PIN
  • 20.  It is a security process in which users provide two different authentication factors to verify themselves.  Two-factor authentication methods rely on a user providing a password, as well as a second factor, usually either a security token  80% of data breaches can be prevented by 2FA.  Less than 10% of users adopted 2FA over the course of over 7 years. TWO FACTOR AUTHENTICATION
  • 21. MFA: IT IS THE MOST SOPHISTICATED AUTHENTICATION METHOD THAT USES 2 OR MORE INDEPENDENT FACTORS TO GRANT USER ACCESS TO A SYSTEM.  Something you know - a password or a pin  Something you have - mobile phone or a security token  Something you are - fingerprint or Face ID  Something you do - typing speed, locational information MULTI FACTOR AUTHENTICATION