15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

devices. Log in and follow the same process—locate and nuke.

Figure 25-13 Erase iPad

Securing Your Data

Every security scenario we’ve discussed so far (remote wipe excepted) was

designed to secure the device itself. Let’s turn to how we can protect our

actual data.

Multifactor Authentication

The terms multifactor and single-factor authentication make the difference

obvious enough: the number of factors used to authenticate the user. What the

terms don’t make obvious is what exactly an authentication factor is, and

why one of the most popular authentication schemes—a user name and

password—is a kind of single-factor authentication. Let’s start with the

factors. First, there is the knowledge factor: something the user knows, such

as a user name, password, date of birth, Social Security number, etc. The

second factor is ownership or possession: something the user has in her

possession, such as a smart card or token. A third factor is inherence:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!