Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)SP B Week 02 Lesson 04 Discussion

#99900
Jason Springer
Participant

One of the top ten OWASP security principles is broken authentication. Broken authentication is crucial to control because attackers can detect it manually and exploit it using brute force and dictionary attacks. If an attacker finds the weaknesses in this broken authentication then they can take control over an admin or multiple other accounts which then allow them to infiltrate the network or system. To prevent this type of attack from happening companies are starting to require two-factor authentication which requires the user to use something they know, have, or are to access the account. This method of authentication is becoming more and more popular because even though people are warned about these attackers many still use simple passwords that the hackers can easily figure out and gain access to that person’s account and possibly more. By implementing two-factor authentication people are forced to use something physical whether biometric or some type of ID card or physical token.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.