Newsletters Monthly
https://github.com/ctalladen78/serverless-lambda-aws-go-boilerplate
View this post on Instagram Authentication schemes are methods used to prove identity. Here they are ranked in order of vulnerability 🗝single factor : most vulnerable form of secrets, easily attacked using brute force and man in the middle techniques 🗝2-factor : if someone access your email, attackers can easily guess password 🗝multifactor : often used between systems, complex networks, banks. Even if someone gets the secret, they cannot use it without further knowledge of the source (ie encryption method) A post shared by Cyan Delta (@cyandelta.app) on May 6, 2020 at 6:22pm PDT
Authentication schemes are methods used to prove identity. Here they are ranked in order of vulnerability 🗝single factor : most vulnerable form of secrets, easily attacked using brute force and man in the middle techniques 🗝2-factor : if someone access your email, attackers can easily guess password 🗝multifactor : often used between systems, complex networks, banks. Even if someone gets the secret, they cannot use it without further knowledge of the source (ie encryption method)
A post shared by Cyan Delta (@cyandelta.app) on May 6, 2020 at 6:22pm PDT