Bruce’s Shorts | 4.8 - Trust and Identity

Internet Security depends on trust and identity. What does that really mean and how do you achieve it? In Bruce’s Shorts, Bruce Devlin takes a light-hearted look at aspects of internet security.
You and your users may have multiple identities, which can improve security. Often the identity of a user is authenticated by a username and password. Some sites are authenticated independently by a third party like Facebook or Google. This involves an element of trust.
What happens if a third party is compromised, what do the bad guys get?
In the next episode of Bruce's Shorts, Devlin looks at authentication.
You might also like...
IP Monitoring & Diagnostics With Command Line Tools: Part 4 - SSH Public Keys
Installing public SSH keys created on your workstation in a server will authenticate you without needing a password. This streamlines the SSH interaction and avoids the need to use stored and visible passwords in your scripts.
Building Software Defined Infrastructure: Network Monitoring
IP networks are a fundamental building block for software defined infrastructure, so a solid technical understanding of network monitoring is essential when building dynamic microservice based systems.
Broadcast Standards: The Principles, Terminology & Structure Of Cloud Compute Based Systems
Here we outline the principles, advantages, and various deployment models for cloud compute infrastructure, along with the taxonomy of cloud compute service providers and the relevant regulatory frameworks.
Live Sports Production: Broadcast Controllers & Orchestration In Live Sports Systems
As production infrastructure, processing resources and the underlying networks required become ever more complex, powerful tools are required to plan, deploy and monitor.
Monitoring & Compliance In Broadcast: Monitoring The Media Supply Chain
Why monitoring the multi-format delivery ecosystem starts with a holistic approach to the entire media supply chain.