SlideShare una empresa de Scribd logo
1 de 34
©2009CarnegieMellonUniversity:1
Improving Usable
Authentication
Jason Hong
jasonh@cs.cmu.edu
©2011CarnegieMellonUniversity:2
Problems with Passwords
• People forget passwords
– Special characters, length, change every
4 weeks => wasted time, helpdesk costs
– NYTimes site 100k readers forget
password, 15% of “new” users are old
– Beverage company: 30% help desk calls
password-related, cost $900k / yr
©2011CarnegieMellonUniversity:3
Problems with Passwords
• People fall for phishing attacks
– Estimated 0.4% of Internet users per year
– Loss of corporate secrets, customer data,
financial info
©2011CarnegieMellonUniversity:4
Passwords Also Don’t Scale Up
• Passwords good if you only have a few
• But passwords aren’t scaling as
devices and services become pervasive
– Laptop, mobile phone, VPN, email (x2),
Wii Fit, WiFi, ATM, PDFs, and dozens of
web sites
©2011CarnegieMellonUniversity:5
Coping Mechanisms Cause Problems
• People cope by using weak passwords
– RockYou: Top 20 passwords used in 2.6%
accounts
• People cope by reusing passwords
– Breach on social networking site means
breach on your site too
– Ex. HBGary CEO used same password for
email, iPad, Twitter, LinkedIn
©2011CarnegieMellonUniversity:6
©2011CarnegieMellonUniversity:7
Past Work: Use Your Illusion
• Problem:
– Hard to remember passwords
– Picture-based approaches are memorable
but easy to guess
• Solution:
– Use blurred pictures
to balance security
with usability
– User tests have shown
high memorability and
hard to guess
©2011CarnegieMellonUniversity:8
Ongoing Research Projects
• WebTicket
– Cheap printable tokens
for a reliable way to log in
• Casual Authentication
– Modulate level of authentication needed
based on prior probability that it’s me
• Ex. Probability of me in Brazil is very low
• Ex. Probability of me at home is high
©2011CarnegieMellonUniversity:9
WebTicket
• Originated from discussion of elderly
– Not only couldn’t remember password,
couldn’t remember what web site to go to
• Not trying to solve authentication for
power users
– Gaw and Felten found undergrads had
3.3 passwords for 7.8 accounts
– In our diary study, people had 11.4
accounts and often reused passwords
©2011CarnegieMellonUniversity:10
How WebTicket Works
• Browser plug-in for
creating new accounts
– Strong passwords are assigned
– Users do not know their passwords
• Print out ticket
– Ticket is encrypted to work
only with specific computer(s)
– QRCode: URL, username, password
• To login, show ticket to webcam
– Can’t fall for phishing attacks
©2011CarnegieMellonUniversity:11
Logging In with WebTicket
©2011CarnegieMellonUniversity:12
WebTicket
• Design:
– Very cheap (paper + printer + webcam)
– Compatible with existing systems
– Easy to deploy
– Easy to teach: treat it like a house key
• Weaknesses:
– Not meant for commonly used passwords
– Tickets can get damaged or lost
– Need to store main encryption key
©2011CarnegieMellonUniversity:13
WebTicket
• Surprises:
– Our strong password generator only
worked for 76% of web sites
– Ex. some sites don’t allow symbols or
certain symbols
©2011CarnegieMellonUniversity:14
WebTicket User Study
• Two studies, 55 people total
– Tested for phishing attacks in study #2
– Two conditions: password and WebTicket
• Experiment
– Create a few accounts
– Login to a few sites
– Come back a week later, login again
©2011CarnegieMellonUniversity:15
WebTicket Study Results
• 1/4 of people using passwords could
not login again a week later
– Didn’t restrict what passwords people used
• Login time for WebTicket slower at first,
faster a week later
• WebTicket perceived as easier and faster
• Simulated phishing attack
– All in password condition fell for it
– 30% of people using WebTicket did
(though data still encrypted)
©2011CarnegieMellonUniversity:16
Ongoing and Future Work
• Mobile phone version to scale up
– A strong password manager
– Can’t fall for phish too
©2011CarnegieMellonUniversity:17
Ongoing Work
• Can encode more data in the ticket
– QR Codes can hold 3k of data
– Ex. “Login only if in Cylab office or home”
– Ex. “Login only if parents at home”
– Ex. “Login only if between 5-8pm”
– Ex. “Notify parents when you login”
– Ex. Include face biometric data
• Field deployment of WebTicket
©2011CarnegieMellonUniversity:18
Casual Authentication
• Observation:
– Level of authentication needed
is the same regardless of context
• Idea:
– Use commodity sensors + behavioral
analysis to estimate prior probabilities
(cheap multi-factor authentication)
– Modulate level of authentication needed
• In likely situations, make logins fast
• In unlikely situations, make it reliable
©2011CarnegieMellonUniversity:19
Example Scenarios
• Scenario 1 – Mobile device
– Prior probability of me being in my office
is high, make authentication fast
– Prior probability of me being in Brazil is
low, so make authentication reliable
• Scenario 2 – Home
– Wake up in morning, go to computer
– Weight sensor in chair, height sensor
via Kinect, mobile device nearby
– Use face recognition to login (fast)
©2011CarnegieMellonUniversity:20
Example Passive Factors
• Cheap, invisible, multi-factor
• Examples for mobile scenario
– Location
– IP address
– WiFi MAC address
– Bluetooth / devices nearby (smartphone)
– Tilt (how you hold device)
• Examples for work/home scenario
– Kinect for Height and Body shape
– Weight sensors
– Gait (how you walk)
©2011CarnegieMellonUniversity:21
Example Active Factors
• Passwords
• Biometrics
• Multiple secret questions
• Email verification
©2011CarnegieMellonUniversity:22
Examples of Location Context
• Personal frequency to that place
– Analysis of 20 people’s GPS locations
– 66.2% of time spent at home
– 20.2% - Work
– 6.3% - Some third place
• Where people login
– Diary study of 20 people over 2 weeks
– Home accounted for 59.2% of logins
– Work accounted for 25.1% of logins
– Public places, school, other: infrequent
©2011CarnegieMellonUniversity:23
Examples of Location Context
• Location entropy
– Concept taken from ecology
– Number of unique people seen in a place
– Approximates public vs private
©2011CarnegieMellonUniversity:24
©2011CarnegieMellonUniversity:25
Other Kinds of Location Info
• Personal location info
– Personal frequency
– Mobility
• Place info
– Going beyond behavior analytics of
people to include analytics of places
– Churn – same people or different?
– Transience – amount of time spent
– Burst – Regularity of people seen
©2011CarnegieMellonUniversity:26
Current Plan of Research
• Systematically evaluate passive factors
• Develop and evaluate threat models
• Techniques for integrating prior
probabilities
• Develop and deploy prototypes
– Mobile case
– Work/Home
• Evaluate security and usability
– Ease of use, time to login
– False accept rates, expert analysis
©2011CarnegieMellonUniversity:27
Long-term Opportunities
• Starting with casual authentication for
devices
– Could be extended in future to
password managers as well
• Could be part of trusted computing
base in future
– Custom chips for secure sensing
– Support for server-side authentication too
©2011CarnegieMellonUniversity:28
©2011CarnegieMellonUniversity:29
Threat Model (Ideal)
No difference
with regular
authentication
No difference
with regular
authentication
Could possibly
mimic passive
factors, would also
need active factors
?
Little LotsLittleLots
Knowledge of securityKnowledgeofUser
©2011CarnegieMellonUniversity:30
Other Approaches
• Two-factor authentication
– Cost
– Requires server support
• Password managers
– Can still fall for phishing
– No guarantee of strong password
• Biometrics
– Marios’ talk next
– False positives / false negatives
©2011CarnegieMellonUniversity:31
Diary Study
©2011CarnegieMellonUniversity:32
Diary Study
©2011CarnegieMellonUniversity:33
Diary Study
• Where people login
Place %
Home 59.2%
Office 25.1%
Public place 6.9%
School 6.2%
Other 2.4%
©2011CarnegieMellonUniversity:34
Our Diary Study of Passwords
• 20 participants over 2 weeks
– Had participants rank importance of account
– 5 means very concerned if someone else
could obtain access to an account

Más contenido relacionado

Similar a Improving Usable Authentication

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
 
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Jason Hong
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
 
Nitin sharma - Deep Learning Applications to Online Payment Fraud Detection
Nitin sharma - Deep Learning Applications to Online Payment Fraud DetectionNitin sharma - Deep Learning Applications to Online Payment Fraud Detection
Nitin sharma - Deep Learning Applications to Online Payment Fraud DetectionMLconf
 
IWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWWIWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWWIWMW
 
IWMW 2006: User Testing on a Shoestring Budget (1)
IWMW 2006: User Testing on a Shoestring Budget (1)IWMW 2006: User Testing on a Shoestring Budget (1)
IWMW 2006: User Testing on a Shoestring Budget (1)IWMW
 
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveMulti-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveCity University London
 
How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Jason Hong
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Jason Hong
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Study for a Virtual Personal Assistant Mobile Application for GlaxoSmithKline...
Study for a Virtual Personal Assistant Mobile Application for GlaxoSmithKline...Study for a Virtual Personal Assistant Mobile Application for GlaxoSmithKline...
Study for a Virtual Personal Assistant Mobile Application for GlaxoSmithKline...George Sofroniou
 
Project 5
Project 5Project 5
Project 5nsobey
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsJason Hong
 
(130608) #fitalk ceic 2013 interview
(130608) #fitalk   ceic 2013 interview(130608) #fitalk   ceic 2013 interview
(130608) #fitalk ceic 2013 interviewINSIGHT FORENSIC
 
How to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsHow to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsMarieke Guy
 

Similar a Improving Usable Authentication (20)

Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
Nitin sharma - Deep Learning Applications to Online Payment Fraud Detection
Nitin sharma - Deep Learning Applications to Online Payment Fraud DetectionNitin sharma - Deep Learning Applications to Online Payment Fraud Detection
Nitin sharma - Deep Learning Applications to Online Payment Fraud Detection
 
IWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWWIWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWW
 
IWMW 2006: User Testing on a Shoestring Budget (1)
IWMW 2006: User Testing on a Shoestring Budget (1)IWMW 2006: User Testing on a Shoestring Budget (1)
IWMW 2006: User Testing on a Shoestring Budget (1)
 
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless InteractiveMulti-Device User Experience Research - Ben Logan, Spotless Interactive
Multi-Device User Experience Research - Ben Logan, Spotless Interactive
 
How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone Apps
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Study for a Virtual Personal Assistant Mobile Application for GlaxoSmithKline...
Study for a Virtual Personal Assistant Mobile Application for GlaxoSmithKline...Study for a Virtual Personal Assistant Mobile Application for GlaxoSmithKline...
Study for a Virtual Personal Assistant Mobile Application for GlaxoSmithKline...
 
Project 5
Project 5Project 5
Project 5
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing Systems
 
(130608) #fitalk ceic 2013 interview
(130608) #fitalk   ceic 2013 interview(130608) #fitalk   ceic 2013 interview
(130608) #fitalk ceic 2013 interview
 
How to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy StepsHow to be a Connected Remote Worker in 10 Easy Steps
How to be a Connected Remote Worker in 10 Easy Steps
 

Último

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Último (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Improving Usable Authentication