08 - Multi-Level Login 1
Listen now
Description
This is the eighth of a series of videos that consider a range of security vulnerabilities. In this video we look at a weakness in a multi-factor authentication mechanism. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated form part of a taught module where hacking methods are used to understand the threats to computer systems before looking at the protective mechanisms available. [(CC) BY-NC-SA 2.0 UK]
More Episodes
Hugh Conway, Lecturer in Marketing, School of Management and Dr John White, Associate Professor, School of Management discuss the MSc Marketing Management and Strategy course at Plymouth University [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England &...
Published 06/26/12
Microsoft Placement Interviews by Kellie Smith for Plymouth Business School [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]
Published 07/19/11
This is the ninth of a series of videos that consider a range of security vulnerabilities. In this video we look at a weakness in a multi-factor authentication mechanism. Some of these videos demonstrate techniques that could be considered “hacking”. These videos and any techniques demonstrated...
Published 02/19/11