Bruce’s Shorts | 4.9 - Authentication
What is two-factor authentication (2FA) and why is your identity at risk if you don’t use it? In a continuing series of short films, Bruce Devlin takes a light-hearted look at aspects of internet security.
Authentication is used to establish the identity of a user attempting to access a web site. But what if It were a robot trying to hack into the site? A challenge-response test like CAPTCHA can be used to determine if the user is a human. Emails can also be used to authenticate addresses. However, these methods are not infallible.
This is where 2FA comes in. Typically an identification token is sent via SMS or email to give a second level of authentication.
You might also like...
HDR & WCG For Broadcast: Part 3 - Achieving Simultaneous HDR-SDR Workflows
Welcome to Part 3 of ‘HDR & WCG For Broadcast’ - a major 10 article exploration of the science and practical applications of all aspects of High Dynamic Range and Wide Color Gamut for broadcast production. Part 3 discusses the creative challenges of HDR…
IP Security For Broadcasters: Part 4 - MACsec Explained
IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.
Standards: Part 23 - Media Types Vs MIME Types
Media Types describe the container and content format when delivering media over a network. Historically they were described as MIME Types.
Building Software Defined Infrastructure: Part 1 - System Topologies
Welcome to Part 1 of Building Software Defined Infrastructure - a new multi-part content collection from Tony Orme. This series is for broadcast engineering & IT teams seeking to deepen their technical understanding of the microservices based IT technologies that are…
IP Security For Broadcasters: Part 3 - IPsec Explained
One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…