Explain to a non-technical friend how you would safely hash and store a password.
system will take in data and store it as non text charaters to prevent vital information from getting stolen
What is Bcrypt?
an adaptive hash function based on the Blowfish symmetric block cipher cryptographic algorithm and introduces a work factor (also known as security factor), which allows you to determine how expensive the hash function will be.
Define the authentication process to a non-technical recruiter.
The way you tell the system you are authorized by providing required credentials
How should your error messaging respond (both HTTP and HTML)? Why?
in a generic form, (The user ID or password was incorrect.),
(The account does not exist.), (The account is locked or disabled.)
Bookmark this link also and consider OWASP fundamentals any time you interact with authentication. Applications developed with security in mind from inception have fewer vulnerabilities throughout their lifecycle.
I’d like to know what authentication methods would be best suited for different types of applications. Why use one over the other, how many different authentication methods are we using going forward.