Bruce’s Shorts | 4.9 - Authentication

What is two-factor authentication (2FA) and why is your identity at risk if you don’t use it? In a continuing series of short films, Bruce Devlin takes a light-hearted look at aspects of internet security.

Authentication is used to establish the identity of a user attempting to access a web site. But what if It were a robot trying to hack into the site? A challenge-response test like CAPTCHA can be used to determine if the user is a human. Emails can also be used to authenticate addresses. However, these methods are not infallible.

This is where 2FA comes in. Typically an identification token is sent via SMS or email to give a second level of authentication.

You might also like...

Building Software Defined Infrastructure: Part 3 - Monitoring Dynamic Resource

Welcome to Part 3 of Building Software Defined Infrastructure. This multi-part content series from Tony Orme explores the microservices based IT technologies that are driving the next phase of transition from hardware to software based broadcast systems. This series is essential…

Live Sports Production: Part 2 - Network Infrastructure

Welcome to Part 2 of ‘Live Sports Production’ - This multi-part series uses a round table style format to explore the technology of live sports production with some of the industry’s leading system designers. It is a fascinating insight into w…

Microphones: Part 11 - The State Of The Art… And The Potential Of MEMS Microphone Arrays

Here we look from the state of the art in microphones, to what the future may bring with the enticing theoretical potential of microphone arrays built using MEMS technology.

Broadcast Standards: Part 27 - Standards Organizations Summary & New Themes

Here we begin to build on the foundations of the incredibly well received ‘Broadcast Standards – The Book’ with the next phase of our exploration of standards used in broadcast. As we proceed, we will focus on a number of key topic…

IP Monitoring & Diagnostics With Command Line Tools: Part 2 - Testing Remote Connections

In the previous article, we set the scene for working with the Command Line Interface (CLI) on a UNIX system. Now we will explore some techniques for performing basic tests on our network infrastructure to check for potential problems.