Google FIDO Authentication Case Study

FIDO Alliance
FIDO AllianceFIDO Alliance
Proprietary + Confidential
Becoming Unphishable
Towards Simpler, Stronger Authentication
Christiaan Brand, Google
Largest and most
secure infrastructure
Proprietary + Confidential
Mobile UI
Application
Network
Software
Hardware
Google Security Stack
Today we tackle authentication
Proprietary + Confidential
Protect Yourself And Your Users
It's easier than you think for someone to steal a password
Password Reuse Phishing Interception
Social Media
BANK
Proprietary + Confidential
123456
Most popular password in 2015
Source: SplashData:
https://www.teamsid.com/wor
st-passwords-2015/
password
2nd most popular password in 2015
Proprietary + Confidential
76%
of account
vulnerabilities were due
to weak or stolen
passwords
43%
success rate
for a well designed
phishing page
goo.gl/YYDM79
Proprietary + Confidential
SMS Usability
Coverage Issues,
Delay, User Cost
Device Usability
One Per Site,
Expensive, Fragile
User Experience
Users find it hard
Phishable
OTPs are increasingly
phished
$
?
Today: The reality of One Time Passwords
Confidential + Proprietary
Web authentication
Password
Server
https://www.google.com
Confidential + Proprietary
https://www.goggle.com
https://www.goggle.com
Confidential + Proprietary
https://www.goggle.com
Password
google.com
Password
Phishing attack
Confidential + Proprietary
https://www.goggle.com
Introducing the Security Key
Your Password
Security Key
Account Data
Core idea - Standard public key cryptography
● User's device mints new key pair, gives public key to server
● Server asks user's device to sign data to verify the user.
● One device, many services, "bring your own device" enabled
Based on Asymmetric Cryptography
Confidential + Proprietary
“I promise a user is here”,
“the server challenge was: 337423”,
“the origin was: google.com”
https://www.google.com
Password
Server
How security key works
Confidential + Proprietary
“I promise a user is here”,
“the server challenge was: 529402”,
“the origin was: goggle.com”
https://www.goggle.com
Password Password
Server
Security key defeats phishing
Google’s Experience
● Enterprise use case
○ Mandated for Google employees
○ Corporate SSO (Web)
○ SSH
○ Forms basis of all authentication
● Consumer use case
○ Available as opt-in for Google consumers
Deployment at Google
Use cases at Google
● Bootstrapping
○ Only used when an employee signs in on a new device the first time
○ This protects against phishing
○ Removable Security Key is carried as part of badge
● Hardware credential binding
○ Once I’ve signed in to a device, long lived tokens (cookies, etc) is usually
issued
○ Every once in a while, a local security key touch is required which is
presented in combination with this local token - this is done to ensure that
the token is still presented from a machine we trust
Time to authenticate
Security Keys are faster to use than OTPs
"If you've been reading your e-mail" takeaway:
Time to authenticate
Second factor support incidents
Security Keys cause fewer support incidents
than OTPs
"If you've been reading your e-mail" takeaway:
Second factor support incidents
We’re not quite done
Proprietary + Confidential
Does this work
with a mobile?
How do we deploy
this at scale?
What if they
lose their key?
But what about other enterprises?
Proprietary + Confidential
Making progress towards stronger authentication
Productizing FIDO U2F
Proprietary + Confidential
Demo: Bootstrapping account
How can you get started?
Proprietary + Confidential
Resources
● To use with Google
Enable 2-Step Verification on your account
Go to: https://security.google.com
Click: 2-Step Verification
Click on the Security Keys tab
● Also use with GitHub, Dropbox, SalesForce
● And / or play with some code
https://github.com/google/u2f-ref-code
https://developers.yubico.com/U2F/Libraries/List_of_libraries.html
Proprietary + Confidential
Questions?
1 von 30

Recomendados

Introduction to FIDO Alliance von
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
1.3K views33 Folien
FIDO Workshop-Demo Breakdown.pptx von
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
653 views19 Folien
Integrating FIDO Authentication & Federation Protocols von
Integrating FIDO Authentication & Federation ProtocolsIntegrating FIDO Authentication & Federation Protocols
Integrating FIDO Authentication & Federation ProtocolsFIDO Alliance
15K views25 Folien
FIDO Authentication: Unphishable MFA for All von
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
512 views20 Folien
Going Passwordless with Microsoft von
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with MicrosoftFIDO Alliance
2.5K views29 Folien
IBM: Hey FIDO, Meet Passkey!.pptx von
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
895 views17 Folien

Más contenido relacionado

Was ist angesagt?

Microsoft's Implementation Roadmap for FIDO2 von
Microsoft's Implementation Roadmap for FIDO2Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2FIDO Alliance
3.9K views30 Folien
Zero trust deck 2020 von
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020Guido Marchetti
324 views44 Folien
Strong Customer Authentication & Biometrics von
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsFIDO Alliance
935 views20 Folien
Passwordless Authentication von
Passwordless AuthenticationPasswordless Authentication
Passwordless AuthenticationEnterprise Management Associates
864 views20 Folien
FIDO Alliance: Welcome and FIDO Update.pptx von
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
839 views19 Folien
Passwordless is Possible - How to Remove Passwords and Improve Security von
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
366 views23 Folien

Was ist angesagt?(20)

Microsoft's Implementation Roadmap for FIDO2 von FIDO Alliance
Microsoft's Implementation Roadmap for FIDO2Microsoft's Implementation Roadmap for FIDO2
Microsoft's Implementation Roadmap for FIDO2
FIDO Alliance3.9K views
Strong Customer Authentication & Biometrics von FIDO Alliance
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
FIDO Alliance935 views
FIDO Alliance: Welcome and FIDO Update.pptx von FIDO Alliance
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance839 views
Passwordless is Possible - How to Remove Passwords and Improve Security von SecureAuth
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth366 views
Fido Technical Overview von FIDO Alliance
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
FIDO Alliance1.9K views
IBM - Hey FIDO, Meet Passkey!.pptx von FIDO Alliance
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
FIDO Alliance235 views
Identity Management with the ForgeRock Identity Platform - So What’s New? von ForgeRock
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
ForgeRock39.9K views
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –... von SSIMeetup
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup2.2K views
Identity & Access Management Day 2022.pdf von Chinatu Uzuegbu
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
Chinatu Uzuegbu192 views
FIDO Authentication Technical Overview von FIDO Alliance
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance447 views
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac... von FIDO Alliance
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
FIDO Alliance4.4K views
What is SSO? An introduction to Single Sign On von Riddhi Sood
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign On
Riddhi Sood108 views
Implementing WebAuthn & FAPI supports on Keycloak von Yuichi Nakamura
Implementing WebAuthn & FAPI supports on KeycloakImplementing WebAuthn & FAPI supports on Keycloak
Implementing WebAuthn & FAPI supports on Keycloak
Yuichi Nakamura3K views
Complex architectures for authentication and authorization on AWS von Boyan Dimitrov
Complex architectures for authentication and authorization on AWSComplex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWS
Boyan Dimitrov1.1K views

Similar a Google FIDO Authentication Case Study

Google Case Study - Towards simpler, stronger authentication von
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationFIDO Alliance
987 views30 Folien
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton von
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonFIDO Alliance
1.2K views25 Folien
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat... von
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
2.1K views25 Folien
Google Case Study: Strong Authentication for Employees and Consumers von
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
11.2K views30 Folien
Becoming Unphishable von
Becoming UnphishableBecoming Unphishable
Becoming UnphishableFIDO Alliance
1.5K views22 Folien
Google Case Study: Becoming Unphishable von
Google Case Study: Becoming UnphishableGoogle Case Study: Becoming Unphishable
Google Case Study: Becoming UnphishableFIDO Alliance
953 views22 Folien

Similar a Google FIDO Authentication Case Study(20)

Google Case Study - Towards simpler, stronger authentication von FIDO Alliance
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance987 views
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton von FIDO Alliance
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
FIDO Alliance1.2K views
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat... von FIDO Alliance
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
FIDO Alliance2.1K views
Google Case Study: Strong Authentication for Employees and Consumers von FIDO Alliance
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance11.2K views
Google Case Study: Becoming Unphishable von FIDO Alliance
Google Case Study: Becoming UnphishableGoogle Case Study: Becoming Unphishable
Google Case Study: Becoming Unphishable
FIDO Alliance953 views
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton von FIDO Alliance
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
FIDO Alliance618 views
Protecting Your Privacy: Cyberspace Security, Real World Safety von AEGILITY
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
AEGILITY532 views
Securing corporate assets_with_2_fa von Hai Nguyen
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen457 views
Multi Factor Authentication Whitepaper Arx - Intellect Design von Rajat Jain
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain60 views
Authentication without Authentication - AppSec California von Soluto
Authentication without Authentication - AppSec CaliforniaAuthentication without Authentication - AppSec California
Authentication without Authentication - AppSec California
Soluto462 views
Security Keys Presentation.pptx von Alok Sharma
Security Keys Presentation.pptxSecurity Keys Presentation.pptx
Security Keys Presentation.pptx
Alok Sharma20 views
Ouch 201211 en von Hai Nguyen
Ouch 201211 enOuch 201211 en
Ouch 201211 en
Hai Nguyen357 views
Why Two-Factor Isn't Enough von SecureAuth
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth407 views
What about Two Factor Authentication? von Sinch
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
Sinch1.2K views
6 Biggest Cyber Security Risks and How You Can Fight Back von MTG IT Professionals
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
Why Depending On Malware Prevention Alone Is No Longer An Option von Seculert
Why Depending On Malware Prevention Alone Is No Longer An Option Why Depending On Malware Prevention Alone Is No Longer An Option
Why Depending On Malware Prevention Alone Is No Longer An Option
Seculert454 views
Authentication and session v4 von skimil
Authentication and session v4Authentication and session v4
Authentication and session v4
skimil839 views

Más de FIDO Alliance

OTIS: Our Journey to Passwordless.pptx von
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
590 views13 Folien
CISA: #MoreThanAPassword.pptx von
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
461 views14 Folien
Introducing FIDO Device Onboard (FDO) von
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
2.3K views23 Folien
FIDO Alliance Webinar: Catch Up WIth FIDO von
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
1.1K views28 Folien
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com von
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
3K views42 Folien
新しい認証技術FIDOの最新動向 von
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
1.5K views19 Folien

Más de FIDO Alliance(20)

OTIS: Our Journey to Passwordless.pptx von FIDO Alliance
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
FIDO Alliance590 views
CISA: #MoreThanAPassword.pptx von FIDO Alliance
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
FIDO Alliance461 views
Introducing FIDO Device Onboard (FDO) von FIDO Alliance
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance2.3K views
FIDO Alliance Webinar: Catch Up WIth FIDO von FIDO Alliance
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance1.1K views
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com von FIDO Alliance
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance3K views
新しい認証技術FIDOの最新動向 von FIDO Alliance
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
FIDO Alliance1.5K views
日立PBI技術を用いた「デバイスフリーリモートワーク」構想 von FIDO Alliance
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
FIDO Alliance1.3K views
Introduction to FIDO and eIDAS Services von FIDO Alliance
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
FIDO Alliance1.5K views
富士通の生体認証ソリューションと提案 von FIDO Alliance
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
FIDO Alliance1.4K views
テレワーク本格導入におけるID認証考察 von FIDO Alliance
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
FIDO Alliance1.2K views
「開けゴマ!」からYubiKeyへ von FIDO Alliance
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
FIDO Alliance1.3K views
FIDO2導入してみたを考えてみた von FIDO Alliance
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
FIDO Alliance1.5K views
中小企業によるFIDO導入事例 von FIDO Alliance
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
FIDO Alliance1.3K views
VPNはもう卒業!FIDO2認証で次世代リモートアクセス von FIDO Alliance
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
FIDO Alliance1.7K views
CloudGate UNOで安全便利なパスワードレスリモートワーク von FIDO Alliance
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
FIDO Alliance949 views
数々の実績:迅速なFIDO認証の展開をサポート von FIDO Alliance
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
FIDO Alliance1K views
FIDO Alliance Research: Consumer Attitudes Towards Authentication von FIDO Alliance
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance567 views
Webinar: Securing IoT with FIDO Authentication von FIDO Alliance
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance1.9K views
20200303 ISR プライベートセミナー:パスワードのいらない世界へ von FIDO Alliance
20200303 ISR プライベートセミナー:パスワードのいらない世界へ20200303 ISR プライベートセミナー:パスワードのいらない世界へ
20200303 ISR プライベートセミナー:パスワードのいらない世界へ
FIDO Alliance767 views

Último

We see everywhere that many people are talking about technology.docx von
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docxssuserc5935b
6 views2 Folien
OMS: Diretrizes para um controle da promoção comercial dos ditos substitutos ... von
OMS: Diretrizes para um controle da promoção comercial dos ditos substitutos ...OMS: Diretrizes para um controle da promoção comercial dos ditos substitutos ...
OMS: Diretrizes para um controle da promoção comercial dos ditos substitutos ...Prof. Marcus Renato de Carvalho
88 views24 Folien
WEB 2.O TOOLS: Empowering education.pptx von
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 views16 Folien
google forms survey (1).pptx von
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptxMollyBrown86
14 views10 Folien
Serverless cloud architecture patterns von
Serverless cloud architecture patternsServerless cloud architecture patterns
Serverless cloud architecture patternsJimmy Dahlqvist
17 views52 Folien
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 von
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲Infosec train
9 views6 Folien

Último(20)

We see everywhere that many people are talking about technology.docx von ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 views
google forms survey (1).pptx von MollyBrown86
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptx
MollyBrown8614 views
Serverless cloud architecture patterns von Jimmy Dahlqvist
Serverless cloud architecture patternsServerless cloud architecture patterns
Serverless cloud architecture patterns
Jimmy Dahlqvist17 views
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 von Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train9 views
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf von RIPE NCC
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
RIPE NCC15 views
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf von RIPE NCC
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
RIPE NCC9 views
AI Powered event-driven translation bot von Jimmy Dahlqvist
AI Powered event-driven translation botAI Powered event-driven translation bot
AI Powered event-driven translation bot
Jimmy Dahlqvist16 views
Existing documentaries (1).docx von MollyBrown86
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 views
UiPath Document Understanding_Day 3.pptx von UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity101 views
Building trust in our information ecosystem: who do we trust in an emergency von Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat92 views
IETF 118: Starlink Protocol Performance von APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC186 views

Google FIDO Authentication Case Study