Risk-Based Authentication Explained

  Рет қаралды 8,309

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 25
@rodpedro_
@rodpedro_ Ай бұрын
I really love Jeff Crume's videos, an easy way to learn about cybersecurity and to stay up to date. Keep up the good work!
@RaptorSLC
@RaptorSLC 27 күн бұрын
Sensitivity in the context of cybersecurity is a new term for me. I wish you had defined it. I'll look into it. This is an excellent series.
@RaptorSLC
@RaptorSLC 27 күн бұрын
Apparently, sensitivity is a synonym for the value of the data. Risk is a broader concept, including all things (like threats) that need to be considered in protecting the data.
@jeffcrume
@jeffcrume 24 күн бұрын
@@RaptorSLCyes, sensitivity refers to how potentially damaging the data could be if it were to be compromised.
@moonpy9191
@moonpy9191 5 күн бұрын
Fantastic insights on user behavior risk factors affecting MFA systems! This explanation goes above and beyond. As someone who has completed cybersecurity training, this was eye-opening. IBM’ influencers at the forefront of enterprise tutorial!
@pankaj16octdogra
@pankaj16octdogra 2 ай бұрын
Superb explanation
@jeffcrume
@jeffcrume 2 ай бұрын
Thanks!
@RezaShaikhly
@RezaShaikhly 2 ай бұрын
So coherent and intuitive, basics of authentication explained thoroughly, thank you! What we are, what we know and what we have... isn't this familiar even in real life and not just cyber world? :)
@jeffcrume
@jeffcrume 2 ай бұрын
I’m glad you liked it. I think your point is right to a great extent, however, I think we tend to rely more on what we are (voice, appearance, etc.) to recognize each other
@toenytv7946
@toenytv7946 2 ай бұрын
I aggree with the step up. This is a hard challenge. Im thinking ml or a selection of a choice like a bunch of shapes to select or even 1 to verify, an emoji maybe? A hand? My car key? Yeah that would be a step up. Thanks Jeff. Feel the love for a very sensitive risk concern in this video. Great breakdown of what could be done and who,when,where,why? Just the how stumps me. Like to see more on IAM❤IBM. Hope the hashicorp has something to add to this mix.
@jeffcrume
@jeffcrume 2 ай бұрын
Thanks for the great feedback! Authentication is a hard problem, for sure. The good news is that we've come a long way from just userid/password as the only option. Definitely more work to be done, though ...
@RohitJagadale-y8b
@RohitJagadale-y8b 2 ай бұрын
Best Explanation
@jeffcrume
@jeffcrume 2 ай бұрын
Thanks!
@blogcorpo
@blogcorpo 2 ай бұрын
Excelent ♥♥
@joymakerRC
@joymakerRC 2 ай бұрын
thanks bro , super informative.
@jeffcrume
@jeffcrume 2 ай бұрын
Glad you liked it!
@nanke1987
@nanke1987 2 ай бұрын
Isn't geolocation hard to test for with the use of VPN? Turning the VPN on and off to because some tools or features need it might make it look like impossible travel, right?
@jeffcrume
@jeffcrume 2 ай бұрын
Yes, on all counts. Which is why I would only use it as one of the factors considered. In fact, they all have weaknesses but, when combined, they look a lot better
@YvonneMcGinnis
@YvonneMcGinnis 2 ай бұрын
Who checks the authentication, is it an automated risk-based authentication system, or is a human behind a risk-based authentication system process?
@jeffcrume
@jeffcrume 2 ай бұрын
This would definitely need to be automated in software. No way for a human to keep up with the demand for most systems
@JoelJosephReji
@JoelJosephReji 2 ай бұрын
Wouldn't VPNs cause cases of impossible travel?
@jeffcrume
@jeffcrume 2 ай бұрын
They could trigger a warning, which is why you shouldn't rely on geo location alone but use it just as one of many factors in making the decision
@JoelJosephReji
@JoelJosephReji 2 ай бұрын
@@jeffcrume makes sense! Thanks!
@iznasen
@iznasen 2 ай бұрын
it's me; open the door 🪄
@jeffcrume
@jeffcrume 2 ай бұрын
Why didn't you say so in the first place? 🤣
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
The moment we stopped understanding AI [AlexNet]
17:38
Welch Labs
Рет қаралды 1,2 МЛН
1 сквиш тебе или 2 другому? 😌 #шортс #виола
00:36
Flipping Robot vs Heavier And Heavier Objects
00:34
Mark Rober
Рет қаралды 59 МЛН
Human vs Jet Engine
00:19
MrBeast
Рет қаралды 131 МЛН
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 2 МЛН
Subnet Mask - Explained
17:55
PowerCert Animated Videos
Рет қаралды 2,9 МЛН
Passwords vs. Passkeys - FIDO Bites Back!
11:05
IBM Technology
Рет қаралды 48 М.
Think Fast, Talk Smart: Communication Techniques
58:20
Stanford Graduate School of Business
Рет қаралды 41 МЛН
Why You Should Turn On Two Factor Authentication
8:12
Tom Scott
Рет қаралды 2,1 МЛН
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 135 М.
Generative Model That Won 2024 Nobel Prize
33:04
Artem Kirsanov
Рет қаралды 131 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Cyber Attack Trends: Global Identity Crisis
15:02
IBM Technology
Рет қаралды 44 М.
How One Line of Code Almost Blew Up the Internet
13:47
Kevin Fang
Рет қаралды 2 МЛН
1 сквиш тебе или 2 другому? 😌 #шортс #виола
00:36