SlideShare uma empresa Scribd logo
1 de 31
12 Factor Autentication
Arpana Shree
II sem MCA
22 Factor Autentication
What is Authentication
Verification of
Identity(man or a
Machine)
What you
have????prove it!!!!
32 Factor Autentication
What is Authentication
3 Categories
What you know
What you have
What you are
Password/pin
Digital
Authentication
Biometric
42 Factor Autentication
What can you
Interpret???
52 Factor Autentication
What is 2 Factor Authentication
It is a Security process.
User provides two means of identification
It uses exactly two factors to assert the identity
of a user
1. Physical Token(Bank Card).
2. typically memorized.
Information:
2FA now is token less
62 Factor Autentication
Can you believe this????
Password is something that
a user knows, ensuring
that the user
also has something
thwarts attackers that
steal or gain access to
passwords.
72 Factor Autentication
Objective of 2FA
“As a method of electronic computer
authentication, is to decrease the
probability that the requestor is not
who he/she claims to be (i.e.,
providing false evidence of his/her
identity.)”
82 Factor Autentication
What Actually 2FA is???
Something you know  PIN
 Password
Something you have  Token
 Smart Cards
Something you are
 Finger print
 Voice pattern
92 Factor Autentication
2-step verification adds an extra layer of
security to your Google Account
Step-1
Enter your username and password
Step-2
Enter code from your phone
102 Factor Autentication
How Actually 2FA Looks Like??
112 Factor Autentication
Risk Involved
Using the same
password on more than
one site
Downloading software
from the Internet
Clicking on links in email
messages
122 Factor Autentication
Imagine loosing access to your account
and everything in it
Go through – or even delete – all of your
emails, contacts, photos, etc.
Pretend to be you and send unwanted or
harmful emails to your contacts
Use your account to reset the passwords
for your other accounts (banking,
shopping, etc.)
132 Factor Autentication
How 2FA helps you?????
An extra layer of security
Most people only have one
layer – their password – to
protect their account. With
2-Step Verification, if a
hacker hacks through your
password layer, he'll still
need your phone to get into
your account.
142 Factor Autentication
How it helps you?????
Sign in will require something you
know and something you have
With 2-Step Verification, you'll
protect your account with something
you know (your password) and
something you have (your phone).
152 Factor Autentication
How it helps you?????
Verification
codes made just
for you
162 Factor Autentication
Usage of 2FA
Used in Internet Banking.
To secure your mails.
Protect your Web Applications.
172 Factor Autentication
How Web Apps will be protected
182 Factor Autentication
2 Factor Autentication 19
How to Activate 2FA in Gmail
Step-1
Login to your Gmail account.
2 Factor Autentication 20
How to Activate 2FA in Gmail
2 Factor Autentication 21
 Click on your name or
photo at the upper
right corner of the
main Google
homepage, and
choose Account.
choose Security from
the navigation options
at left.
Step-2
How to Activate 2FA in Gmail
Step-3
Click on the button “Settings” along side two
step verification
2 Factor Autentication 22
How to Activate 2FA in Gmail
2 Factor Autentication 23
How to Activate 2FA in Gmail
Enter the phone Number and select which mode
you like to receive the code
2 Factor Autentication 24
How to Activate 2FA in Gmail
You will receive the code in your phone.Enter
the code in the text box provided
2 Factor Autentication 25
How to Activate 2FA in Gmail
Select “Trust this Computer button”
Decide whether to trust the computer you're
using or not. Click Next.
2 Factor Autentication 26
How to Activate 2FA in Gmail
Read About 2FA and Click button ”Confirm”
2 Factor Autentication 27
How to Activate 2FA in Gmail
You will receive the message
“2-step verification activation is complete!
Gmail will log you out and return you to the
login screen”
Start up with “Login”
2 Factor Autentication 28
After Login to ur Gmail Account
Code will be sent to your phone.
Gmail will ask you to enter the code to verify
2 Factor Autentication 29
2 Factor Autentication
312 Factor Autentication

Mais conteúdo relacionado

Mais procurados

Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
DCIT, a.s.
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
StudsPlanet.com
 
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor AuthenticationThe Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
PortalGuard dba PistolStar, Inc.
 

Mais procurados (10)

E commerce security
E commerce securityE commerce security
E commerce security
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
The ultimate deal on open id uses
The ultimate deal on open id usesThe ultimate deal on open id uses
The ultimate deal on open id uses
 
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor AuthenticationThe Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 

Semelhante a Two factor autentication in Gmail

Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
Hai Nguyen
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
monroel
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 

Semelhante a Two factor autentication in Gmail (20)

Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
Two
TwoTwo
Two
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
Passwordless Mobile Banking.pdf
Passwordless Mobile Banking.pdfPasswordless Mobile Banking.pdf
Passwordless Mobile Banking.pdf
 
Email security
Email securityEmail security
Email security
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
120 i143
120 i143120 i143
120 i143
 
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATIONSECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
How to use microsoft authenticator app
How to use microsoft authenticator appHow to use microsoft authenticator app
How to use microsoft authenticator app
 
INSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPSINSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPS
 

Mais de Arpana shree (9)

Evo mouse
Evo mouseEvo mouse
Evo mouse
 
Cryptography
CryptographyCryptography
Cryptography
 
Banking locker security using Image processing
Banking locker security using Image processingBanking locker security using Image processing
Banking locker security using Image processing
 
Graphical Password authentication using Hmac
Graphical Password authentication using HmacGraphical Password authentication using Hmac
Graphical Password authentication using Hmac
 
Enumerated data types in C
Enumerated data types in CEnumerated data types in C
Enumerated data types in C
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Database security
Database securityDatabase security
Database security
 
System Z operating system
System Z operating systemSystem Z operating system
System Z operating system
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 

Último

一比一原版加拿大多伦多大学毕业证(UofT毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(UofT毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(UofT毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(UofT毕业证书)如何办理
egfdgfd
 
原版定制(爱大毕业证书)英国爱丁堡大学毕业证原件一模一样
原版定制(爱大毕业证书)英国爱丁堡大学毕业证原件一模一样原版定制(爱大毕业证书)英国爱丁堡大学毕业证原件一模一样
原版定制(爱大毕业证书)英国爱丁堡大学毕业证原件一模一样
gfhdsfr
 
一比一原版(Bath毕业证书)英国桑德兰大学毕业证如何办理
一比一原版(Bath毕业证书)英国桑德兰大学毕业证如何办理一比一原版(Bath毕业证书)英国桑德兰大学毕业证如何办理
一比一原版(Bath毕业证书)英国桑德兰大学毕业证如何办理
B
 
一比一定制(OSU毕业证书)美国俄亥俄州立大学毕业证学位证书
一比一定制(OSU毕业证书)美国俄亥俄州立大学毕业证学位证书一比一定制(OSU毕业证书)美国俄亥俄州立大学毕业证学位证书
一比一定制(OSU毕业证书)美国俄亥俄州立大学毕业证学位证书
rgdasda
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
A
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
Fir
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
B
 
一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书
A
 
一比一原版(Princeton毕业证书)普林斯顿大学毕业证如何办理
一比一原版(Princeton毕业证书)普林斯顿大学毕业证如何办理一比一原版(Princeton毕业证书)普林斯顿大学毕业证如何办理
一比一原版(Princeton毕业证书)普林斯顿大学毕业证如何办理
C
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Último (20)

一比一原版加拿大多伦多大学毕业证(UofT毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(UofT毕业证书)如何办理一比一原版加拿大多伦多大学毕业证(UofT毕业证书)如何办理
一比一原版加拿大多伦多大学毕业证(UofT毕业证书)如何办理
 
原版定制(爱大毕业证书)英国爱丁堡大学毕业证原件一模一样
原版定制(爱大毕业证书)英国爱丁堡大学毕业证原件一模一样原版定制(爱大毕业证书)英国爱丁堡大学毕业证原件一模一样
原版定制(爱大毕业证书)英国爱丁堡大学毕业证原件一模一样
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
一比一原版(Bath毕业证书)英国桑德兰大学毕业证如何办理
一比一原版(Bath毕业证书)英国桑德兰大学毕业证如何办理一比一原版(Bath毕业证书)英国桑德兰大学毕业证如何办理
一比一原版(Bath毕业证书)英国桑德兰大学毕业证如何办理
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
一比一定制(OSU毕业证书)美国俄亥俄州立大学毕业证学位证书
一比一定制(OSU毕业证书)美国俄亥俄州立大学毕业证学位证书一比一定制(OSU毕业证书)美国俄亥俄州立大学毕业证学位证书
一比一定制(OSU毕业证书)美国俄亥俄州立大学毕业证学位证书
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
 
一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书
 
一比一原版(Princeton毕业证书)普林斯顿大学毕业证如何办理
一比一原版(Princeton毕业证书)普林斯顿大学毕业证如何办理一比一原版(Princeton毕业证书)普林斯顿大学毕业证如何办理
一比一原版(Princeton毕业证书)普林斯顿大学毕业证如何办理
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
💞 Safe And Seℂure ℂall Girls Dehradun ℂall Girls Serviℂe Just ℂall 🍑👄93157910...
💞 Safe And Seℂure ℂall Girls Dehradun ℂall Girls Serviℂe Just ℂall 🍑👄93157910...💞 Safe And Seℂure ℂall Girls Dehradun ℂall Girls Serviℂe Just ℂall 🍑👄93157910...
💞 Safe And Seℂure ℂall Girls Dehradun ℂall Girls Serviℂe Just ℂall 🍑👄93157910...
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 

Two factor autentication in Gmail

  • 2. Arpana Shree II sem MCA 22 Factor Autentication
  • 3. What is Authentication Verification of Identity(man or a Machine) What you have????prove it!!!! 32 Factor Autentication
  • 4. What is Authentication 3 Categories What you know What you have What you are Password/pin Digital Authentication Biometric 42 Factor Autentication
  • 5. What can you Interpret??? 52 Factor Autentication
  • 6. What is 2 Factor Authentication It is a Security process. User provides two means of identification It uses exactly two factors to assert the identity of a user 1. Physical Token(Bank Card). 2. typically memorized. Information: 2FA now is token less 62 Factor Autentication
  • 7. Can you believe this???? Password is something that a user knows, ensuring that the user also has something thwarts attackers that steal or gain access to passwords. 72 Factor Autentication
  • 8. Objective of 2FA “As a method of electronic computer authentication, is to decrease the probability that the requestor is not who he/she claims to be (i.e., providing false evidence of his/her identity.)” 82 Factor Autentication
  • 9. What Actually 2FA is??? Something you know  PIN  Password Something you have  Token  Smart Cards Something you are  Finger print  Voice pattern 92 Factor Autentication
  • 10. 2-step verification adds an extra layer of security to your Google Account Step-1 Enter your username and password Step-2 Enter code from your phone 102 Factor Autentication
  • 11. How Actually 2FA Looks Like?? 112 Factor Autentication
  • 12. Risk Involved Using the same password on more than one site Downloading software from the Internet Clicking on links in email messages 122 Factor Autentication
  • 13. Imagine loosing access to your account and everything in it Go through – or even delete – all of your emails, contacts, photos, etc. Pretend to be you and send unwanted or harmful emails to your contacts Use your account to reset the passwords for your other accounts (banking, shopping, etc.) 132 Factor Autentication
  • 14. How 2FA helps you????? An extra layer of security Most people only have one layer – their password – to protect their account. With 2-Step Verification, if a hacker hacks through your password layer, he'll still need your phone to get into your account. 142 Factor Autentication
  • 15. How it helps you????? Sign in will require something you know and something you have With 2-Step Verification, you'll protect your account with something you know (your password) and something you have (your phone). 152 Factor Autentication
  • 16. How it helps you????? Verification codes made just for you 162 Factor Autentication
  • 17. Usage of 2FA Used in Internet Banking. To secure your mails. Protect your Web Applications. 172 Factor Autentication
  • 18. How Web Apps will be protected 182 Factor Autentication
  • 20. How to Activate 2FA in Gmail Step-1 Login to your Gmail account. 2 Factor Autentication 20
  • 21. How to Activate 2FA in Gmail 2 Factor Autentication 21  Click on your name or photo at the upper right corner of the main Google homepage, and choose Account. choose Security from the navigation options at left. Step-2
  • 22. How to Activate 2FA in Gmail Step-3 Click on the button “Settings” along side two step verification 2 Factor Autentication 22
  • 23. How to Activate 2FA in Gmail 2 Factor Autentication 23
  • 24. How to Activate 2FA in Gmail Enter the phone Number and select which mode you like to receive the code 2 Factor Autentication 24
  • 25. How to Activate 2FA in Gmail You will receive the code in your phone.Enter the code in the text box provided 2 Factor Autentication 25
  • 26. How to Activate 2FA in Gmail Select “Trust this Computer button” Decide whether to trust the computer you're using or not. Click Next. 2 Factor Autentication 26
  • 27. How to Activate 2FA in Gmail Read About 2FA and Click button ”Confirm” 2 Factor Autentication 27
  • 28. How to Activate 2FA in Gmail You will receive the message “2-step verification activation is complete! Gmail will log you out and return you to the login screen” Start up with “Login” 2 Factor Autentication 28
  • 29. After Login to ur Gmail Account Code will be sent to your phone. Gmail will ask you to enter the code to verify 2 Factor Autentication 29