Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Replacing Passwords with Multiple Factors - Email, OTP, and Hardware Keys
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Average time to detect an attack
- 3 What kind of information is at risk
- 4 No medical data was stolen
- 5 This is just one attack
- 6 Have I beenpwned
- 7 The answer is most likely
- 8 The problem with these breaches
- 9 Financial loss
- 10 Why
- 11 Usually authentication methods
- 12 Bad security and bad usability
- 13 Bad passwords
- 14 Unprotected passwords
- 15 Phishing
- 16 The line of death
- 17 Wall of death
- 18 Usability
- 19 Password managers
- 20 Limiting failed login attempts
- 21 Changing passwords often
- 22 Security questions
- 23 A clever attacker
- 24 The industry has rallied behind
- 25 You know this idea
- 26 Users will leave
- 27 User hostile
- 28 New approaches
- 29 Email
- 30 Emailbased authentication
- 31 Problems with emailbased authentication
- 32 Problems with SMSbased authentication
- 33 SMS7 flaw
- 34 Authentication is deprecated
- 35 Onetime passwords OTP
- 36 Google Authenticator
- 37 Linode
- 38 Security
- 39 Hardware keys
- 40 U2F
- 41 Applicationspecific keys
- 42 Security and usability
- 43 Google study
- 44 Browser support
- 45 Issues with hardware keys
- 46 Biometric authentication
- 47 Multifactor authentication
- 48 Why now
- 49 Apply pressure
- 50 Require multifactor authentication
- 51 Specific implementations
- 52 Django No Password
- 53 Django Rest
- 54 Django OTP
- 55 Django U2F
- 56 Run server
- 57 Add physical key
- 58 Backup codes
- 59 OTP device
- 60 One password
- 61 Onetime password
- 62 OTP device link
- 63 Logging out
- 64 Conclusion