🌲Jgrove
Search
CTRL + K
🌲Jgrove
Search
CTRL + K
Hobby
Backpacking
Tetons
Running
Running Home
Notes
Assume Breach
CIA Triad
Defense in Depth
Factors of Authentication
Insider Threats
Least Privilege
Never Trust Always Verify
Supply Chain Attack
Usable Security
Projects
Budgeting App
Password Manager🚧
Reading
Tech
Alice and Bob Learn Application Security
A&B Chapter 1 - Security Fundamentals
A&B Chapter 2 - Security Requirements
Alice and Bob Learn Application Security
Home
Factors of Authentication
Something you have
Phone
Computer
Token
Badge for work
Something you are
Fingerprint
Iris Scan
Something physically unique to you
Something you know
Password
Passphrase
pattern