TWO FACTOR Authentication for Cybersecurity

Поделиться
HTML-код
  • Опубликовано: 13 сен 2023
  • If you've heard cybersecurity terms but you've been avoiding the topic, this microlearning course will help you get started. We're adding fast lessons, quizzes, and more to this course here: www.socratica.com/courses/cyb...
    Today’s Cybersecurity Lesson: 2-factor authentication
    As you might expect, there are TWO parts to 2-factor authentication.
    1) Something you know (like a password)
    2) Something you have (like a phone) to verify your identity.
    You type in your password like normal, then you confirm that it’s really you trying to sign in, usually through a text message or authenticator app. This one-two punch of cybersecurity makes it much harder for bad guys to steal access to your accounts.
    Password theft is one of the most common forms of cyberattack, but with 2-factor authentication, even IF a hacker gets ahold of your password, they won’t be able to access your account without the second factor. This increased peace of mind makes it well worth the extra time it takes to sign in. Many online services offer 2FA as an option, including Google, Facebook, Microsoft, Apple, probably your bank…
    Are there drawbacks? Well, it does usually mean that you’re more dependent on your mobile device. If you lose your phone, that could mean-at least temporarily- losing access to your accounts. You’ll need to make sure there’s a way to recover access, either through backup codes or some other account recovery process.
    And we don’t want to lull you into a false sense of security. 2-factor authentication ISN’T a 100% guarantee of safety. Attackers may still be able to bypass this kind of security by stealing your phone number through SIM swapping or other nefarious means. The bad guys are always out there, working overtime. But 2-factor authentication is one of the simplest and most effective ways to add an extra layer of protection to your online identity and personal data.
    Subscribing to Socratica means you’ll Learn More about being CyberSecure.
    Support Socratica on Patreon:
    / socratica
    This video series was made possible by the generous support of our Patrons on Patreon. We'd like to recognize our VIP Patrons and send them our sincere thanks!
    José Juan Francisco Castillo Rivera, KW, M Andrews, Robert Fulbright, Marcos Silveira, Christopher Kemsley, Massimiliano Pala, Eric Eccleston, Jeremy Shimanek, Michael Shebanow, Alvin Khaled, Kevin B, John Krawiec, Umar Khan, MdeG, and Tracy Karin Prell!
    Written and Produced by Kimberly Hatch Harrison
    Edited by Megi Shuke
    #Socratica #Cybersecurity #2FA

Комментарии • 6

  • @Socratica
    @Socratica  Месяц назад

    Socratica Friends, we hear you. You want more detail. We're building up a cybersecurity course, and these videos will be the intros to various subjects. Expect learning pages and exercises to extend your knowledge. The course is still growing, but you can sign up for free here: www.socratica.com/courses/cybersecurity

  • @jagadishgospat2548
    @jagadishgospat2548 9 месяцев назад +1

    Wow I actually just started learning ethical hacking in Kali and I'm realising that most people's devices and accounts don't have much security other than the one provided by the device or the service they use like Google's two step verification.

  • @ingramjd
    @ingramjd 9 месяцев назад +1

    I expected more understood stuff here.....

  • @Way02infinity
    @Way02infinity 9 месяцев назад +2

    First Comment ❤️

  • @District876
    @District876 9 месяцев назад +1

    Can you please provide a coding demonstration in Java to implement it