• Describe the different types of authentication credentials
• Explain what single sign-on can do
• List the account management procedures for securing passwords
Imagine you just discovered that your entire digital life has been “trashed.” Every email stored in your Gmail account is deleted. All of the data on your Mac-Book notebook has been erased. Everything on your iPhone smartphone and your iPad tablet has been wiped clean. Your credit numbers stored on Amazon are exposed. And someone has been using your Twitter account to broadcast racist and homophobic messages. What a nightmare! But that’s ...