How Cybersecurity Really Works: A Hands-On Guide for Total Beginners by Sam Grubb

How Cybersecurity Really Works: A Hands-On Guide for Total Beginners by Sam Grubb

Author:Sam Grubb [Grubb, Sam]
Language: eng
Format: epub, pdf
Tags: computers, internet, Online Safety & Privacy, Security, Viruses & Malware, social media
ISBN: 9781718501294
Google: ngEGEAAAQBAJ
Publisher: No Starch Press
Published: 2021-06-15T23:34:05.157931+00:00


The Security Key option generates a token—a Type 2 authentication factor—whose unique key lets you log in to the system. You must have a physical security token to pair with this device. Typically you’ll only find these keys used in businesses that can afford to buy them, but inexpensive commercial tokens, such as the Duo or Google Authenticator apps for phones, are also available.

Windows also offers two password options, a traditional password and a picture password. The picture password requires you to choose a picture and then draw on it. For example, you could choose a picture of a face and then draw circles around the eyes. To access the system, you’ll need to replicate your actions when shown the picture at login. This is Type 4 authentication (something you do). It’s usually considered the weakest form of authentication, because most people’s gestures follow the natural paths of the picture. For example, if you chose a picture of a flag on a flagpole, you might draw a line down the flagpole, which is fairly easy for an attacker to guess, because it’s a predictable action.

Take a moment to try each option to see which one you like the best. Just because you’ve always used a password doesn’t mean it’s right for you. Adding a different type of authentication might provide better security or functionality for your device.

Before moving on, let’s look at one last setting. Below the different sign-in options is a drop-down menu for Require Sign-In. This lets you determine at which point your system should require you to log back in after being inactive for a time: the two options are Never and When PC Wakes Up from Sleep. You should always require a new login after the system wakes up. This keeps your system safe from unauthorized access should you stop using it but forget to log out. This setting should be turned on by default.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.