20 years: technology, cybersecurity & operations
Now we've laid the groundwork for digital authentication, it's time to advance. Join Ciarán Rooney in this video as he delves into the common password pitfalls, what constitutes a strong password and the future of digital authentication.
Now we've laid the groundwork for digital authentication, it's time to advance. Join Ciarán Rooney in this video as he delves into the common password pitfalls, what constitutes a strong password and the future of digital authentication.
Subscribe to watch
Access this and all of the content on our platform by signing up for a 14-day free trial.
12 mins 44 secs
There are many ways a password can be compromised, including: brute force attack, dictionary attack and phishing. You can avoid many pitfalls by using longer passwords, using the maximum character range, not using common words/patterns and never reusing your password.
Key learning objectives:
Understand how your password can be compromised
Learn how to create a strong password
Indentify how authentication is improving
Access this and all of the content on our platform by signing up for a 14-day free trial.
You can use the Bruce Schneier Method, which involves taking the first letter from every word in a memorable sentence. The sentence ‘My mother always packed my lunches’ could be used as Mmapml - and you could even substitute symbols or numbers for some letters for even higher entropy.
Alternatively, you can use the passphrase method. It involves connecting multiple words into a long password. For example, 2Elephants3Cafes&4Plates?
Lastly, you can use a password manager. A password manager can generate long and complex passwords for you, with very high entropy. It can then keep track of a unique password for all the different services you use.
Limiting login attempts. A service administrator can limit the number of incorrect password attempts that someone can make before being locked out of the system.
Multi-factor authentication (MFA). Also known as two-factor authentication, this method requires a user to provide two or more authentication factors before they are granted access to a system.
Single sign-on and Third-party authentication. This uses the security of another identity platform to act as a form of authentication for a user. You might see this used with a corporate network or an external platform such as Google, Facebook, or Twitter.
Access this and all of the content on our platform by signing up for a 14-day free trial.
There are no available videos from "Ciaran Rooney"