Главная
Study mode:
on
1
Intro
2
Why strong authentication
3
Companies in common
4
RSA hack
5
Market size
6
Breach statistics
7
Online fraud
8
Hackers everywhere
9
Breaches
10
Trends
11
Why now
12
Authentication methods
13
Issues faced by IT managers
14
What is Oath
15
Members of Oath
16
Algorithms
17
Roadmap
18
Certification Program
19
Review
20
Framework
21
Oath
22
Credential provisioning
23
Objectives
24
Certification
25
Typical Scenario
26
Framework Overview
27
Why OTP is still expensive
28
Why OTP should be a commodity
29
Lin OTP
30
Lin schematic
31
Authentication integration architecture
32
Thirdparty authentication
33
Adaptive Authentication
34
Biometrics
35
Behavioral Advantage
36
Security Technologies Fail
37
Behavioral Biometrics
38
We are changing
39
Is it creepy
Description:
Explore strong authentication methods and their importance in cybersecurity through this AppSec California 2016 conference talk. Learn about the limitations of static passwords, the benefits of one-time passwords (OTP), and various OTP generation methods. Discover the Initiative for Open Authentication (OATH) and its role in developing open-source authentication algorithms. Understand the cost challenges associated with implementing strong authentication and how open-source solutions can make it more accessible to organizations of all sizes. Delve into topics such as credential provisioning, certification programs, and integration architectures. Examine emerging trends in authentication, including adaptive authentication and behavioral biometrics. Gain insights into why certain security technologies fail and how the landscape of authentication is evolving to meet modern challenges.

Open Source Authentication: Security Without High Cost

OWASP Foundation
Add to list
0:00 / 0:00