Télécommunications

Cyber Security: Protecting Online Accounts

Keeping your accounts protected using different 2-step verification methods, including hardware security keys. Video includes Yubikey demonstration, as well password good practice and other security advice.

My own security keys are Yubikey 5C models, which you can find on Amazon.com here: https://amzn.to/3ubKrcs and on Amazon.co.uk here: https://amzn.to/2ZyDJlz (paid affiliate links). Note that I have no association with Yubico, and that I purchased the keys I use. However, note that an Amazon Associate I earn from qualifying purchases when you click on either of the Amazon links.

In this video I refer to keeping passwords on encrypted USB drives, which I have covered in the following videos:

“Encrypted USB Devices” (hardware encryption):

VeraCrypt Encrypted USB Drive (stand alone software encryption):

DatAshur PRO Encryped USB 3.0 Drive (hardware encryption):

The Microsoft blog post on a passwordless future is here:
https://www.microsoft.com/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/

The 2019 Microsoft Security Baseline announcement in which they explain in detail why regularly changing (expiring) passwords is no longer necessary is here:
https://techcommunity.microsoft.com/t5/microsoft-security-baselines/security-baseline-final-for-windows-10-v1903-and-windows-server/ba-p/701084

The YouTube post reporting that 2-step verification will be required for all monetizing channels from November 1st 2021 is here: https://support.google.com/youtube/thread/122577225/required-2-step-verification-for-creators-in-the-youtube-partner-program?hl=en

The Google Titan security key web page is here:
https://store.google.com/gb/product/titan_security_key?hl=en-GB

And the Yubico security key products page is here:

Products

The Yubikey page on setting up security keys in Linux (Ubuntu — but it works in other distros) is here: https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F

More videos on computing and related topics can be found at http://www.youtube.com/explainingcomputers

You may also like my ExplainingTheFuture channel at: http://www.youtube.com/explainingthefuture

Chapters:
00:00 Introduction
00:35 Passwords & Beyond
03:14 Authentication Methods
05:45 Security Keys (hardware authentication devices)
09:31 Maximum Security

11:23 Two More Things

Views : 108285
cyber security

Source by ExplainingComputers

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *