1000 passwords plus4/19/2023 ![]() ![]() At K-State, a lot of faculty and staff now use two factor authentication whenever they authenticate at K-State. So think about some places that you run into two factor authentication, video games, online banking. ![]() And that is something the user has or possesses as the second factor of authentication. And typically, they combine something the user knows, such as a password or a pin number ,with something the user has, such as a credit card, or in a lot of cases, it’s access to a mobile phone or an email account. And that is pretty much exactly what you think it is, it is two different factors of authentication combined to provide greater security. There is also something called multi factor authentication or two factor authentication, which you’ve probably come across, especially if you do online banking or play certain video games. An inherent factor would be things such as a retinal scan, or a fingerprint scan, or DNA test, something that these are really can’t change about themselves.Īnd so to authenticate a user in a computer system, we typically use one of these factors at a minimum to authenticate them. And an inherent factor is something the user inherently is. The third form of authentication is an inherent factor. And for most computer systems, we use knowledge factors as the primary form of authentication. Those are what makes up a knowledge factor. But it could be even other facts such as birth dates, and mother’s maiden names, and social security numbers, things that the user would know very quickly. Typically, we think of this as passwords and pin numbers or anything else the user has memorized. A knowledge factor is something the user knows that authenticates themselves. The second one we can talk about is knowledge factors. A police badge, for example, is a form of authentication that authenticates who that person is. For example, an ownership factor could be a physical key to a building, it could be a USB drive that has a token on it, or it could be some other symbol or some other device that the user has to authenticate that they are who they say they are. There are ownership factors, which is something the user has. Now, typically, authentication requires three different factors. You’re letting your computer authenticate the fact that you are who you say you are. So when you sit down to a computer, and you type in your password, that is a form of authentication. ![]() And authentication mainly deals with a few things, it’s determining if the person is who they say they are. Authentication is a very, very important part of anything in cyber security. Okay, let’s get started.įirst, we need to talk about authentication. And so I’m encouraging us all to put our white hats on at this point, and come at this topic from the view of doing this for the good of everybody else and trying to help them secure and protect their data. But as a computer scientist, it’s important for you to understand those topics so that you can defend against them and know what they are in case they get used against you. And so some of the things we’re going to talk about today, if used maliciously, could be very illegal, they could be felonies, they’re very, very dangerous things for you to use maliciously. But you can also have white hat hackers, which are hackers that use their skills for benevolent means– to help companies find security holes in their infrastructures and hopefully patch those holes and become a little bit safer. And typically, you have the black hat hackers, which are the ones that do so maliciously. So in computer science, we talk about different types of hackers. And so we’re going to talk about some different ways that we can keep our data secure on our computers.īefore we get into that, a word of warning, I’m encouraging each of you to put your white hat on when we talk about this. We’re trying to secure data both on our computers, but also as we transmitted across the Internet, and any other communication technologies we might be using. So in cybersecurity, we really are asking ourselves one big question, how do we keep our data secure, and that’s really all it comes down to. Cyber Security is another important research area in computer science, and it’s one that directly impacts a lot of computer users in their daily lives. ![]() In this module, we’re going to discuss a lot of topics related to cyber security. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |