Главная
Study mode:
on
1
Intro
2
Principles of Security
3
Key Issues
4
Authentication Methods
5
Passwords
6
Biometrics
7
Message Hash
8
Private Key Authentication
9
Each Mark Authentication
10
Credibility
11
Microsoft Card Space
12
Personal Card
13
Relying Party
14
Identity Provider
15
Card Space
16
Analogy
17
Element of Trust
18
Example
19
Email Encryption
20
Authentication with PGP
Description:
Explore authentication principles and methods in this comprehensive lecture from the "Introduction to Security and Network Forensics" book. Delve into key security issues, password management, biometrics, message hashing, and private key authentication. Examine each mark authentication, credibility, and Microsoft Card Space concepts. Understand personal cards, relying parties, and identity providers. Analyze the Card Space analogy and elements of trust. Investigate email encryption and authentication with PGP. Gain valuable insights into security and forensic computing through this in-depth presentation by Prof Bill Buchanan, part of the Security and Forensic Computing module at Edinburgh Napier University.

Authentication Methods in Security and Network Forensics - Lecture 4

Bill Buchanan OBE
Add to list
0:00 / 0:00