Главная
Study mode:
on
1
Intro
2
Principles of Security
3
Key Issues
4
Authentication Methods
5
Biometrics
6
Message Hash
7
Digital Certificate
8
Trusted Root
9
Microsoft Card Space
10
Personal Card
11
Relying Party
12
Identity Provider
13
Analogy
14
Example
15
Email Encryption
16
Authentication with PGP
Description:
Learn about authentication methods in security and network forensics through this comprehensive video lecture. Explore key principles of security, authentication techniques including biometrics, message hashing, and digital certificates. Understand concepts like trusted roots, Microsoft CardSpace, and personal cards. Examine the roles of relying parties and identity providers in authentication systems. Delve into practical applications such as email encryption and authentication with PGP. Part of a broader series on security and forensic computing, this lecture provides essential knowledge for students and professionals in the field.

Introduction to Security and Network Forensics: Authentication - Lecture 4

Bill Buchanan OBE
Add to list
0:00 / 0:00