Hands-on workshop on information security basics:
- how to think about security
- threat modelling / risk assessment
- authentication
- device security
Handouts:
https://drive.google.com/file/d/13FZBhEY2kSsThkq7-5fTXf8eqGaSI5pg/view?usp=sharing
44. § 5.1.1.2
Verifiers SHALL require subscriber-chosen memorized secrets
to be at least 8 characters in length. Verifiers SHOULD permit
subscriber-chosen memorized secrets at least 64 characters in
length.
length
45. composition
§ 5.1.1.2
All printing ASCII [RFC 20] characters as well as the space
character SHOULD be acceptable in memorized secrets.
Unicode [ISO/ISC 10646] characters SHOULD be accepted as
well.
Verifiers SHOULD NOT impose other composition rules (e.g.,
requiring mixtures of different character types or prohibiting
consecutively repeated characters) for memorized secrets.
46. § 5.1.1.2
Verifiers SHOULD NOT require memorized secrets to be
changed arbitrarily (e.g., periodically).
rotation
93. Many graphics from The Noun Project
Bear by Gan Khoon Lay; Computer Fire by Ian Ransley; Computer by Azis; Credit
card Gonzalo Bravo; Fingerprint by Ben Davis; Lock with keyhole by Brennan
Novak; Marker by Jeff Seevers; Nokia 3310 by Stan Fisher; Notification by vijay
sekhar; Shield by Wayne Thayer; Spy by Alen Krummenacher; iPhone by Ross
Sokolovski.