Artwork

İçerik Kip Boyle tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Kip Boyle veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !

EP 88: The CIA Triad - The Basis of Cybersecurity (Authentication)

37:12
 
Paylaş
 

Manage episode 353017554 series 3368188
İçerik Kip Boyle tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Kip Boyle veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

https://www.yourcyberpath.com/88/

In this episode we arrive at the end of our five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication.

Authentication is always associated with passwords and how you can prove that you are who you say you are.

When you hear Authentication, always have things like tokens, digital certificates, multi factor authentication or two factor authentication in mind but remember that Authentication will keep changing and evolving over the years and new ways, techniques or protocols could be introduced to the field.

Jason and Kip go over the different authentication factors and how you might be asked about them, on a job interview.

Then they go over different concepts and protocols like SSO, SSL, TLS and how they relate or can be used for authentication.

In the End, Kip goes over password managers and what is the criteria for choosing a good password manager.

What You’ll Learn

What is Authentication and how does it look like in the real world?

● What is Zero trust?

● What is the difference between the different availability options?

● What are the five factors of authentication?

● What is SSO?

Relevant Websites For This Episode

https://www.yourcyberpath.com/

Other Relevant Episodes

Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality)

Episode 85 - The CIA Triad - The Basis of Cybersecurity (Integrity)

Episode 86 - The CIA Triad - The Basis of Cybersecurity (Availability)

Episode 87 - The CIA Triad - The Basis of Cybersecurity (Nonrepudiation)

  continue reading

116 bölüm

Artwork
iconPaylaş
 
Manage episode 353017554 series 3368188
İçerik Kip Boyle tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Kip Boyle veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

https://www.yourcyberpath.com/88/

In this episode we arrive at the end of our five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication.

Authentication is always associated with passwords and how you can prove that you are who you say you are.

When you hear Authentication, always have things like tokens, digital certificates, multi factor authentication or two factor authentication in mind but remember that Authentication will keep changing and evolving over the years and new ways, techniques or protocols could be introduced to the field.

Jason and Kip go over the different authentication factors and how you might be asked about them, on a job interview.

Then they go over different concepts and protocols like SSO, SSL, TLS and how they relate or can be used for authentication.

In the End, Kip goes over password managers and what is the criteria for choosing a good password manager.

What You’ll Learn

What is Authentication and how does it look like in the real world?

● What is Zero trust?

● What is the difference between the different availability options?

● What are the five factors of authentication?

● What is SSO?

Relevant Websites For This Episode

https://www.yourcyberpath.com/

Other Relevant Episodes

Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality)

Episode 85 - The CIA Triad - The Basis of Cybersecurity (Integrity)

Episode 86 - The CIA Triad - The Basis of Cybersecurity (Availability)

Episode 87 - The CIA Triad - The Basis of Cybersecurity (Nonrepudiation)

  continue reading

116 bölüm

Tüm bölümler

×
 
Loading …

Player FM'e Hoş Geldiniz!

Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.

 

Hızlı referans rehberi