<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:#0563C1;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:#954F72;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri",sans-serif;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72">
<div class="WordSection1">
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<p class="MsoNormal">Hi all,<o:p></o:p></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<p class="MsoNormal">This week, Blue Team will discuss about the topic related to last lecture&#8217;s discussion &#8220;Multi Factor Authentication&#8221; and the benefits associated with it from the perspective of security.<o:p></o:p></p>
<p style="mso-margin-top-alt:15.75pt;margin-right:0in;margin-bottom:15.75pt;margin-left:0in;background:white">
<span style="font-size:10.5pt;font-family:&quot;Arial&quot;,sans-serif;color:#424242">This method of Authentication helps to use more secure ways of authenticating a user instead of using only username and password authentication.<o:p></o:p></span></p>
<p style="mso-margin-top-alt:15.75pt;margin-right:0in;margin-bottom:15.75pt;margin-left:0in;background:white">
<span style="font-size:10.5pt;font-family:&quot;Arial&quot;,sans-serif;color:#424242">While many organizations deploy multiple security controls designed to reduce their attack footprint and insulate their data and systems against attack, those protective controls are
 nullified if an attacker can obtain a valid set of user credentials to the environment.<o:p></o:p></span></p>
<p style="mso-margin-top-alt:15.75pt;margin-right:0in;margin-bottom:15.75pt;margin-left:0in;background:white;font-variant-ligatures: normal;font-variant-caps: normal;orphans: 2;text-align:start;widows: 2;-webkit-text-stroke-width: 0px;text-decoration-style: initial;text-decoration-color: initial;word-spacing:0px">
<span style="font-size:10.5pt;font-family:&quot;Arial&quot;,sans-serif;color:#424242">Multi-factor authentication has evolved as the single most effective control to insulate an organization against remote attacks and when implemented correctly, can prevent most threat
 actors from easily gaining an initial foothold into an organization, even if credentials become compromised.<o:p></o:p></span></p>
<p class="MsoNormal">Resources:<o:p></o:p></p>
<p class="MsoNormal"><a href="https://www.lbmc.com/blog/why-multi-factor-authentication">https://www.lbmc.com/blog/why-multi-factor-authentication</a><o:p></o:p></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<p class="MsoNormal">Best,<o:p></o:p></p>
<p class="MsoNormal">Rozy<o:p></o:p></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>