Bruce’s Shorts | 4.9 - Authentication

What is two-factor authentication (2FA) and why is your identity at risk if you don’t use it? In a continuing series of short films, Bruce Devlin takes a light-hearted look at aspects of internet security.

Authentication is used to establish the identity of a user attempting to access a web site. But what if It were a robot trying to hack into the site? A challenge-response test like CAPTCHA can be used to determine if the user is a human. Emails can also be used to authenticate addresses. However, these methods are not infallible.

This is where 2FA comes in. Typically an identification token is sent via SMS or email to give a second level of authentication.

You might also like...

Building Software Defined Infrastructure: Observability In Microservice Architecture

Building dynamic microservices based infrastructure introduces the potential for variable latency which brings new monitoring challenges that require an understanding of observability.

IP Monitoring & Diagnostics With Command Line Tools: Part 5 - Using Shell Scripts

Shell scripts enable you to edit your diagnostic and monitoring commands into a script file so they can be repeated without needing to type them manually every time. Shell scripts also offer some unique and powerful features that help to…

Broadcast Standards: Kubernetes & The Architecture Of Cloud Compute Based Systems

Here we describe Kubernetes and the taxonomy of containerized architecture based cloud compute system designs it manages.

Live Sports Production: Backhaul In Live Sports Production

Getting content reliably and securely from venue to studio remains key to live sports production so here we discuss the technology and services required.

Monitoring & Compliance In Broadcast: Monitoring Delivery In The Converged OTA – OTT Ecosystem

Convergence or coexistence between linear broadcast, IP based delivery and 5G mobile networks creates new challenges for monitoring of delivery paths, both technically and logistically.