This YouTube video provides information regarding authentication methods needed to access various systems. this is the third video in an Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are
There are three forms of authentication
•Something you know
•Something you have
•Something about you
Type of Material:
YouTube video
Recommended Uses:
This video would be appropriate in an introductory level course on computer literacy or as a beginning discussion on information security.
Self-paced material for informal learning.
Technical Requirements:
internet and a browser
Identify Major Learning Goals:
The video presents very basic concepts on authentication as part of a course on Introduction to Computers.
The viewer should understand three different ways in which users can authenticate to systems; via something you know, something you have, or something about you.
Target Student Population:
freshmen, or high school - perhaps older people
Prerequisite Knowledge or Skills:
No prerequisites.
Content Quality
Rating:
Strengths:
This is a very easy straightforward presentation of the concepts with examples and some tips for best practices
The author provides clear information and has an excellent video presence.
Concerns:
Content is very basic, for the digitally illiterate. there is no significant information for those with technical skills.
Potential Effectiveness as a Teaching Tool
Rating:
Strengths:
it is simple with good examples on the three different forms of authentications
It is a good material for the level of knowledge (Introduction to Computers) presented.
Concerns:
Too long to be effective as a teaching tool.
Ease of Use for Both Students and Faculty
Rating:
Strengths:
It is easy to comprehend and assimilate for freshmen, high school students and any non technical individuals who are new to using computers and security
Concerns:
Too long video also because of the low level of the approached concepts.
Other Issues and Comments:
this video was published back in June 18, 2014, it helps if it is updated with some new ways, developments and additional applications and examples
The author uses his casual and comfortable style to provide some excellent information on user authentication.
Creative Commons:
Search by ISBN?
It looks like you have entered an ISBN number. Would you like to search using what you have
entered as an ISBN number?
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.