The Seven Young Goats and multifactor authentication
#1
Information 
Quote:
[Image: fairy-tales-seven-young-goats-featured.jpg]

Our ancestors may not have had computers, but they certainly knew a thing or two about keeping children safe. We’ve already used Little Red Riding Hood as a guide to explaining Man-in-the-Middle attacks, handshakes, and phishing. Now let’s talk about two-factor authentication (2FA) and biometric security. This time, we’ll use a somewhat less-known fairy tale called The Wolf and the Seven Young Goats.

The Wolf and the Seven Young Goats

Now, cybercriminals don’t tend to eat their victims, so we’re interested in the first part, where the wolf is trying to get into the goats’ house. Let’s take a step-by-step look at what’s really going on here.

1. The mother goat goes into the forest after warning her kids not to open the door to strangers.

2. The wolf approaches the house, says he is the mother goat, and asks to be let in. The young goats immediately notice the wolf doesn’t sound like their mother, and so they don’t open the door.

The concept of authentication is clearly illustrated in the fairy tale The Wolf and the Seven Young Goats. For those unfamiliar with the tale, it involves a family of goats consisting of a mother and seven youngsters. When the mother leaves to get food, she tells her children not to let in the wolf (who will eat them) and teaches them to recognize the differences in their voices and fur color. She leaves and the wolf knocks on their door. Learning from the children that his voice is too low, he alters it to trick them into thinking he’s their mother. The young goats remember, then, to look under the door and see the wolf’s dark, furry feet. Again, they refuse him entry. The wolf then disguises his feet, dusting them with flour to make them look white, like the mother goat’s. Ultimately, the young goats are convinced (and eaten).
...
Continue Reading
Reply


Messages In This Thread
The Seven Young Goats and multifactor authentication - by harlan4096 - 24 September 19, 06:08

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
VeraCrypt developer claims that Microso...
Microsoft Account Te...harlan4096 — 10:57
Surfshark VPN : Award-winning VPN servi...
How can generative...jasonX — 09:58
Surfshark VPN : Award-winning VPN servi...
What is post-quant...jasonX — 09:50
Adobe Acrobat Reader DC 2026.001.21411
Adobe Acrobat Read...harlan4096 — 09:47
Acronis True Image 2021 Build 32010
It's been a while si...jasonX — 09:27

[-]
Birthdays
Today's Birthdays
avatar (46)Rodneykak
avatar (49)tradeSmode
Upcoming Birthdays
avatar (45)wapedDow
avatar (49)oapedDow
avatar (42)Sanchowogy
avatar (46)MeighGoask
avatar (44)techlignub
avatar (43)Stevenmam
avatar (50)onlinbah
avatar (50)fuspeukChark
avatar (44)werriewWaiNg
avatar (38)Freemanleo
avatar (43)cdoubapKit
avatar (38)lystraPonia
avatar (31)smith8395john
avatar (51)steakelask
avatar (45)Termoplenka
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
avatar (51)Toligo
avatar (38)RobertUtelt

[-]
Online Staff
There are no staff members currently online.

>