Join Lisa Bock for an in-depth discussion in this video Using smart cards, tokens, and multifactor authentication, part of Foundations of IT Security: Operating System Security.
- View Offline
When providing authentication,…we can do this in one of three ways.…What you know in the form of a password, a passphrase,…a pin, or even a lock combination, what you have,…such as a smart card, token device, or dongle,…or what you are in the form of a biometric.…For example, a fingerprint.…A smart card is a credit card sized card that contains…information on an embedded chip about the user…such as credit and buying preferences, loyalty program data,…and even medical information.…
A smart card is a small device that contains a microchip…that has data storage capabilities.…It can store several forms of identification…such as a fingerprint and a password.…Available in several form factors such as cards,…key fobs, and USB tokens.…Uses include access control.…For example, employee access and ID badges.…Membership cards for nightclubs, VIP access cards,…or preferred door entry cards.…
Banking cards, used as credit or electronic purse…used to store currency for purchases.…Health care stores patient history and medical information,…
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Creating strong passwords
- Understanding biometric security
- Adjusting permission behavior
- Enabling auditing
- OS hardening
- Using the Microsoft Baseline Security Analyzer
- Protecting email