Uploaded by HAMMAD IFTIKHAR UL HAQ

CN Presentation

advertisement
Group Members
Hammad Iftikhar Ul Haq
F2018266219
Muhammad Ahmad
F2019266242
Syed Ammar Bukhari
F2019266243
Resource Person
Ammar Yasir Sajjad
Top Best Authentication Systems
What is Authentication
•
•





Authentication is the process of verifying the identity of a user or information. User
authentication is the process of verifying the identity of a user when that user logs in to a
computer system.
Example
Code Generate From Smartphones
Captcha Test
Fingerprints
Voice Biometrics
Face Recognition
Types of Authentications
 Single Factor Authentication
 Two Factor Authentication
 Multi Factor Authentication
Single Factor Authentication
This was the first method of security that was developed. On this authentication
system, the user has to enter the username and the password to confirm whether
that user is logging in or not.
Advantages
• It is a very simple to use and straightforward system.
• It is not at all costly.
• The user does not need any huge technical skills.
Disadvantages
• It is not at all password secure. It will depend on the strength of the password
entered by the user.
• The protection level in Single-Factor Authentication is much low.
Two Factor Authentication
In this authentication system, the user has to give a username, password, and
other information. There are various types of authentication systems that are
used by the user for securing the system.
Advantages
• Provides better security than the Single-factor Authentication system.
• The productivity and flexibility increase in the two-factor authentication system.
• Two-Factor Authentication prevents the loss of trust.
Disadvantages
• It is time-consuming.
Multi Factor Authentication
In this type of authentication, more than one factor of authentication is needed.
This gives better security to the user. Any type of keylogger or phishing attack
will not be possible in a Multi-Factor Authentication system. This assures the
user, that the information will not get stolen from them.
Advantages
•
•
•
•
No risk of security.
No information could get stolen.
No risk of any key-logger activity.
No risk of any data getting captured.
Disadvantages
•
•
It is time-consuming.
It can rely on third parties.
Top Best Authentication Systems
There are plenty of options out there, but here's our shortlist of the best Authentication Systems.
These products won a Top Rated award for having excellent customer satisfaction ratings.







WatchGuard AuthPoint
Cisco Secure Access by Duo
Google Authenticator
The Okta Identity Cloud
Azure Active Directory
LastPass for Business
Firebase
WatchGuard AuthPoint
•
•
•
WatchGuard AuthPoint is a multi-factor authentication (MFA) service
Helps companies keep their assets, information, and user identities secure.
AuthPoint’s mobile app makes it easy for users to approve or deny login attempts.
Cisco Secure Access by Duo
•
•
Cisco Secure Access, by Duo, now part of Cisco
It is presented as a solution to protect applications by using a second source of validation, like
a phone or token, to verify user identity before granting access.
Google Authenticator
•
It is a mobile authentication app
Okta Identity Cloud
•
•
•
Okta is an independent identity provider.
The Okta Identity Cloud enables organizations to securely connect the right people to the
right technologies at the right time.
More than 7,000 pre-built integrations to applications and infrastructure providers
Azure Active Directory
•
•
•
Microsoft Azure Active Directory (Azure AD) is a cloud-based identity.
Supports restricted access to applications with Azure Multi-Factor Authentication (MFA).
Built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and
integration with Microsoft productivity and cloud storage (Office 365, OneDrive, etc) as well
as 3rd party services.
LastPass for Business
•
•
•
Identity management software
Covers password management, single sign-on, and multifactor authentication.
LastPass business solutions aim to help teams & businesses take control of their identity
management by providing unified visibility across every entry point to the user’s business.
Firebase
•
•
Google offers the Firebase suite of application development tools,
Available free or at cost for higher degree of usages, priced flexibly accorded to features
needed.
Courses in Pakistan
CISSP - Certified Information Systems Security Professional
CISMP - Certificate in Information Security Management Principles
CISA - Certified Information Systems Auditor
CISSP - Certified Information Systems Security Professional
Held by over 30,000 qualified professionals worldwide, the Certified Information Systems
Security Professional qualification shows proven knowledge and is the key to a higher earning potential
in role.
Location: OMNI Academy Karachi BBR Towers.
35 hours course duration.
Fee : 393000
Pay : 25k to 10 lac
LEARNING
Use the knowledge gained in a practical manner beneficial to your
organization
Protect your organizational assets using access control techniques and
strengthen confidentiality and integrity controls from the world of
cryptography
Secure your network architecture and design (implement Cyber
security)
Achieve your organizational objectives such as legal & compliance,
Information assurance, security and data governance
Visit Website Omny Academy and apply online.
Where you can apply:
Thank You
Download