Posts

Showing posts from September, 2024

Cyber Security Awareness 007: Token-Based

Image
What Is a Token? Think of a token like a digital pass. When you go to a concert, you might get a ticket that lets you in and out of the venue. Similarly, in the online world, a token is a small, unique piece of data that acts like a ticket to access certain websites or services. Once you're logged in, this token confirms that you're allowed to be there without asking for your password every time. How Does Token-Based Authentication Work? Here’s how the process typically happens: User Login : You start by entering your username and password, just like when you log in to your favourite app or website Token Generation : Once your login details are verified as correct, the website or app generates a special token for you. This token is a bit like a temporary ID card Token Storage : Your device (whether it’s your phone, tablet, or computer) stores this token safely. Think of it as your phone holding onto a pass that lets you move around the website or app without needing to log in a

Cyber Security Awareness 006: Biometric

Image
Have you ever unlocked your phone or laptop using your fingerprint or face? If so, you've already experienced the convenience of biometrics. Biometrics, also known as "something you have" authentication, is a technology that uses unique physical or behavioural characteristics to verify your identity and grant access to information. In today's rapidly evolving digital landscape, simple measures like passwords are no longer sufficient to keep up with sophisticated cyber threats. Biometric authentication systems, which gained widespread popularity around the 2010s, offer a more secure and efficient way to protect your data. By leveraging complex algorithms that analyse a user's unique physical and behavioural traits, biometrics provide a fast and easy way to authenticate individuals. Biometrics utilise various human attributes, including fingerprints, facial recognition, iris scanning, and voice recognition, to verify identity. Unlike passwords, which can be easily c