Completed
Why OTP is still expensive
Class Central Classrooms beta
YouTube playlists curated by Class Central.
Classroom Contents
Open Source Authentication: Security Without High Cost
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why strong authentication
- 3 Companies in common
- 4 RSA hack
- 5 Market size
- 6 Breach statistics
- 7 Online fraud
- 8 Hackers everywhere
- 9 Breaches
- 10 Trends
- 11 Why now
- 12 Authentication methods
- 13 Issues faced by IT managers
- 14 What is Oath
- 15 Members of Oath
- 16 Algorithms
- 17 Roadmap
- 18 Certification Program
- 19 Review
- 20 Framework
- 21 Oath
- 22 Credential provisioning
- 23 Objectives
- 24 Certification
- 25 Typical Scenario
- 26 Framework Overview
- 27 Why OTP is still expensive
- 28 Why OTP should be a commodity
- 29 Lin OTP
- 30 Lin schematic
- 31 Authentication integration architecture
- 32 Thirdparty authentication
- 33 Adaptive Authentication
- 34 Biometrics
- 35 Behavioral Advantage
- 36 Security Technologies Fail
- 37 Behavioral Biometrics
- 38 We are changing
- 39 Is it creepy