An inherent factor would be things such as a retinal scan, or a fingerprint scan, or DNA test, something that these are really can’t change about themselves.Īnd so to authenticate a user in a computer system, we typically use one of these factors at a minimum to authenticate them. And an inherent factor is something the user inherently is. The third form of authentication is an inherent factor. And for most computer systems, we use knowledge factors as the primary form of authentication. Those are what makes up a knowledge factor. But it could be even other facts such as birth dates, and mother’s maiden names, and social security numbers, things that the user would know very quickly. Typically, we think of this as passwords and pin numbers or anything else the user has memorized. A knowledge factor is something the user knows that authenticates themselves. The second one we can talk about is knowledge factors. A police badge, for example, is a form of authentication that authenticates who that person is. For example, an ownership factor could be a physical key to a building, it could be a USB drive that has a token on it, or it could be some other symbol or some other device that the user has to authenticate that they are who they say they are. There are ownership factors, which is something the user has. Now, typically, authentication requires three different factors. You’re letting your computer authenticate the fact that you are who you say you are. So when you sit down to a computer, and you type in your password, that is a form of authentication. And authentication mainly deals with a few things, it’s determining if the person is who they say they are. Authentication is a very, very important part of anything in cyber security. Okay, let’s get started.įirst, we need to talk about authentication. And so I’m encouraging us all to put our white hats on at this point, and come at this topic from the view of doing this for the good of everybody else and trying to help them secure and protect their data. But as a computer scientist, it’s important for you to understand those topics so that you can defend against them and know what they are in case they get used against you. And so some of the things we’re going to talk about today, if used maliciously, could be very illegal, they could be felonies, they’re very, very dangerous things for you to use maliciously. But you can also have white hat hackers, which are hackers that use their skills for benevolent means– to help companies find security holes in their infrastructures and hopefully patch those holes and become a little bit safer. And typically, you have the black hat hackers, which are the ones that do so maliciously. So in computer science, we talk about different types of hackers. And so we’re going to talk about some different ways that we can keep our data secure on our computers.īefore we get into that, a word of warning, I’m encouraging each of you to put your white hat on when we talk about this. We’re trying to secure data both on our computers, but also as we transmitted across the Internet, and any other communication technologies we might be using. So in cybersecurity, we really are asking ourselves one big question, how do we keep our data secure, and that’s really all it comes down to. Cyber Security is another important research area in computer science, and it’s one that directly impacts a lot of computer users in their daily lives. Note that the email address in your sync ID is case sensitive so it must be typed in the same way it is shown in the Sync settings section of whatever version of Passwords Plus you are using.In this module, we’re going to discuss a lot of topics related to cyber security. You will need both of these in order to log into Passwords Plus on a computer. Sync settings consist of an email address and a 10 digit Sync ID.Find your Sync settings on your phone app in Passwords Plus/Settings/Sync Settings.Once you have installed on the Mac or PC you need to log into your Sync account. Once you do that, see above for how to export from a Mac or PC.Ĭlick here for instructions on installing Passwords Plus on a Mac or PC. So you will need to download either the Mac or Windows versions onto a PC and log into your sync account. There is no way to export from the phone apps. If you currently have Passwords Plus only on iOS or Android
0 Comments
Leave a Reply. |