20 years: technology, cybersecurity & operations
Now we've laid the groundwork for digital authentication, it's time to advance. Join Ciarán Rooney in this video as he delves into the common password pitfalls, what constitutes a strong password and the future of digital authentication.
Now we've laid the groundwork for digital authentication, it's time to advance. Join Ciarán Rooney in this video as he delves into the common password pitfalls, what constitutes a strong password and the future of digital authentication.
Finance Unlocked is the video learning platform built for finance professionals.
This content is also available as part of a premium, accredited video course. Sign up for a 14-day trial to watch for free.
12 mins 44 secs
There are many ways a password can be compromised, including: brute force attack, dictionary attack and phishing. You can avoid many pitfalls by using longer passwords, using the maximum character range, not using common words/patterns and never reusing your password.
Key learning objectives:
Understand how your password can be compromised
Learn how to create a strong password
Indentify how authentication is improving
This content is also available as part of a premium, accredited video course. Sign up for a 14-day trial to watch for free.
You can use the Bruce Schneier Method, which involves taking the first letter from every word in a memorable sentence. The sentence ‘My mother always packed my lunches’ could be used as Mmapml - and you could even substitute symbols or numbers for some letters for even higher entropy.
Alternatively, you can use the passphrase method. It involves connecting multiple words into a long password. For example, 2Elephants3Cafes&4Plates?
Lastly, you can use a password manager. A password manager can generate long and complex passwords for you, with very high entropy. It can then keep track of a unique password for all the different services you use.
Limiting login attempts. A service administrator can limit the number of incorrect password attempts that someone can make before being locked out of the system.
Multi-factor authentication (MFA). Also known as two-factor authentication, this method requires a user to provide two or more authentication factors before they are granted access to a system.
Single sign-on and Third-party authentication. This uses the security of another identity platform to act as a form of authentication for a user. You might see this used with a corporate network or an external platform such as Google, Facebook, or Twitter.
This content is also available as part of a premium, accredited video course. Sign up for a 14-day trial to watch for free.