Overview
This course explores the importance of proper authentication practices, the limitations of passwords, the benefits of two-factor authentication, and the implications of offline password cracking. The course covers the costs associated with inadequate authentication, the properties of secure authentication systems, and offers real-world examples and guidance. The intended audience for this course is individuals interested in information security and authentication practices.
Syllabus
Layout
Why am I talking about this?
The costs
The phases
Properties you would expect
2FA is the answer to everything
Passwords need to be secure!
Offline password cracking
New official guidance/guidelines
Real-world
What it should look like (2)
Properties one would expect
Conclusion and take-aways
References
Taught by
44CON Information Security Conference