From the course: IT Security Foundations: Operating System Security

Unlock the full course today

Join today to access over 24,000 courses taught by industry experts.

Multi-factor authentication

Multi-factor authentication

- [Instructor] When providing authentication, we could use one of several different methods. Of all the ways to provide authentication, the password is the least expensive and is widely used. However, over the years, there have been many damaging data breaches, with a huge loss in passwords and other sensitive information. I'm at this website, World's Biggest Data Breaches and Hacks. Now we can take a look at this where you can see the names of many well-known companies that have been breached in some way, possibly taking your password. If you're not sure if you were hacked, you can go to haveibeenpwned, and here you can enter your email address and check if you have an account that's been compromised in a data breach. And then I'll scroll down where we can find a little bit more information about some of the largest breaches and some recently added breaches. Security systems are becoming more robust in ways to…

Contents