Follow along with the slides
Follow along with the slides during the talk, or review them later.
Exercise 1: Words
The primary goal of multi-factor authentication is to provide a multi-layered defense system. This helps guarantee that the people who utilize your system are who they claim to be. Even if one factor is compromised, there are still additional barriers to breach. For example, if an individual’s computer password is stolen, a malicious person would still need more information to break into the account.
Exercise 2: Sentences
Multi-factor authentication improves security. Large companies use multi-factor authentication to limit access to mission-critical systems; health care systems use multi-factor authentication to guarantee protected health information stays secure; and many smaller business use multi-factor authentication because it helps keep phishers out.
Exercise 3: Paragraphs
MFA requires users to verify their identity using two or more independent methods of authentication. Individuals need to authenticate using factors from at least two categories: something the user knows, something the user has, and something the user is. Knowledge factors are the most common type of security, but they are also the most vulnerable because the information is easier to share or steal. Authentication examples of something the user knows include passwords, PIN (or personal identification numbers), and answers to supposedly secret questions (such as “Where were you born?” or “The name of your first grade teacher”). Something the user has – also called possession factors – have been the foundation of security for centuries; the most basic version is a key, which opens a lock. Possession factors are more complex now, but the premise is the same. Authentication examples of possession factors include Google Authenticator (an app on your phone), SMS text message with a code, soft token (also called software token), hard token (also called hardware token), and security badge. A biometric verification (or something the user is) is a way to identify a person using their unique biological traits. Examples of biometric verification include fingerprint, palmprint, voice, retina and iris patterns, signature, and DNA.
Exercise 4: Emergency Room
If you have a medical emergency or are in labor, even if you cannot pay or do not have medical insurance or you are not entitled to Medicare or Medicaid, you have the right to receive, within the capabilities of this hospital’s staff and facilities:
- An appropriate medical screening examination
- Necessary stabilizing treatment (including treatment for an unborn child) and, if necessary
- An appropriate transfer to another facility.
This hospital does participate in the Medicaid program.
Exercise 5: Geo Distributing
Geo Distributing Your Repository in the Cloud
This presentation reviews trends and advantages from migrating large repositories into the cloud, and the benefits of doing so. It covers case studies and trends, showing examples of cloud only as well as hybrid models for repositories of many TB and being accessed by hundreds or thousands of users. Hints and tips for planning are also given to take advantage of cloud benefits while managing your costs effectively.