2.8 Unauthorized User Access Part 3: Strong Authentication

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

12 hours 48 minutes
Video Transcription
just gonna mention one more time. The need for strong authentication, multi factor
type one something, you know, talk to something you have and type three something you are and again in your mind. Link that to biometrics. All right, so when we're looking at these, you may also hear other entities extend beyond just thes three types. You may hear of type four as something you do
and that really? You know, if we just keep the three types, often we link something you do to something you are so with Type three and biometrics. We think of physiological traits, and we think of behavior traits. So my physiological traits will change my thumbprint, my iris scan, my retina scan and so on.
But then I also have biometrics that are based on my behavior
that are unique to me.
Have I walk how I talk, how I type? You know, those elements are behavior based. And even though I could change how I walk or talk for a little bit eventually if I do it enough, I'll go back to old patterns. So something I do is
you know, I consider to be type three. It's part of something I am. It's just, you know, part of the broader picture.
Also, you may hear folks mention some where you are, and you have no problem with that as well. You know, if you look at GPS positioning tracking, the fact that I'm in my house kind of authenticates me is being Kelly Hander hand
and you can say, Well, not 100%. Of course, none of these are 100% right. That's why we have multi factor more than one element or elements from more than one category. And that's what we call strong authenticity. We've got to get away from single factor authentication. Any of these types
can be spoofed.
Up Next
Certified Cloud Security Professional (CCSP)

This Certified Cloud Security Professional (CCSP) certification course covers topics across six domains, to ensure the candidate has a wide range of competencies and is capable in the assessment and implementation of cloud service solutions.

Instructed By