0% found this document useful (0 votes)
102 views4 pages

Web Authentication Essentials

Web authentication is being developed as a replacement for passwords that will make login security simpler and stronger. It will allow users to log in to websites using digital devices, biometrics like fingerprints, or security keys instead of usernames and passwords. The system is being standardized by the World Wide Web Consortium who said that passwords have outlived their usefulness due to the risk of breaches and the resources required to manage them. With web authentication, login security is achieved through physical devices and biometrics rather than passwords, reducing the risk of credentials being stolen.

Uploaded by

Ion Bn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views4 pages

Web Authentication Essentials

Web authentication is being developed as a replacement for passwords that will make login security simpler and stronger. It will allow users to log in to websites using digital devices, biometrics like fingerprints, or security keys instead of usernames and passwords. The system is being standardized by the World Wide Web Consortium who said that passwords have outlived their usefulness due to the risk of breaches and the resources required to manage them. With web authentication, login security is achieved through physical devices and biometrics rather than passwords, reducing the risk of credentials being stolen.

Uploaded by

Ion Bn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

LESSON ELEVEN

WEB AUTHENTICATION
I. Warm-ups (Discussion point)
A. PASSWORDS. What is a password? How and why do you use it? Do you think they are secure?
Why?
B. Discuss about these items or words from the lesson. What can you say about these words and their
role in your life?

Logging in / username / password / secure / standard / Internet / browser / fingerprint


common knowledge / data / breaches / time / resources / vulnerable / biometrics

C. FINGERPRINTS. You strongly believe fingerprints are more secure than passwords. Give
arguments to support your idea. Try to persuade the audience that the future of Internet Security
deals with or depends on fingerprints
D. BIOMETRICS: What will we be able to do with these biometrics in the future? Complete the table.
What We Could Do Security Risks
Eyes
Fingerprints
DNA
Body smell
Voice
Face

E. LOGIN: Spend one minute writing down all of the different words you associate with the word
"login". Share your words with the group and talk about them. Put the words into different
categories.
F. DEVICES: Rank these items. Put the best devices at the top. Give reasons to your choice.

 electronic dictionary  smart glasses  smart watch


 3D printer  USB drive  MP3 player
 scanner  digital camera

VOCABULARY MATCHING. Match the words (1-14) with their definitions (a-n)
1. credentials a. A group of people with a common purpose or function acting as an
organization.
2. infinitely b. Relating to or about the face.
3. standard c. The details you need (such as usernames and passwords) needed to
log in online.
4. body d. A required or agreed level of quality or attainment.
5. platform e. To a very great degree; without limit.
6. biometrics f. A standard for the hardware of a computer system, determining what
kinds of software it can run.
7. facial g. The use of the face and body to be used for security purposes (e.g.
logging on to websites, gaining access to areas of a building, etc.).
8. numbered h. Something known by most people.
9. common i. The ability to produce a desired or intended result.
10. efficacy j. Open to physical or emotional attack or harm.
11. breach k. Not surviving or remaining in a position of power or advantage for
much longer.
12. drain l. A thing made or adapted for a particular purpose, especially a piece of
mechanical or electronic equipment.
13. vulnerable m. Cause money, energy, or another valuable resource to be lost, wasted,
or used up.
14. device n. A gap in a wall, barrier, or defense.

II. Before Listening Activities

1. TRUE / FALSE: Read the title of the lesson. Guess if 1-8 below are true (T) or false (F).

1. The article said passwords are on their way in. T / F


2. Login credentials might soon be replaced by Web Authentication. T / F
3. The World Wide Web Consortium said Web Authentication is dangerous. T / F
4. The article said fingerprints are not part of Web Authentication. T / F
5. The WWW Consortium suggested the use of passwords is nearing an end. T / F
6. The WWW Consortium suggested passwords are a waste of resources. T / F
7. Web Authentication increases the risk of having passwords stolen. T / F
8. Web Authentication makes use of biometrics. T / F

2. Listen to the lesson informative text and find out whether your findings were correct
SYNONYM MATCH: Match the following synonyms from the article.
1. worry a. makes up
2. credentials b. attained
3. standard c. all over
4. universally d. limited
5. accounts for e. fret
6. numbered f. burden
7. efficacy g. weak
8. drain h. ID
9. vulnerable i. benefit
10. achieved j. guideline

PHRASE MATCH: (Sometimes more than one choice is possible.)

1. usernames and passwords are on


2. the security of our login a. secure login system
3. replaced by an infinitely more b. devices or biometrics
4. universally used c. by web browsers
5. such as fingerprints d. passwords being numbered
6. The WWWC spoke about the days of e. their efficacy
7. passwords have outlived f. their way out
8. they are a drain of g. less risk
9. users are at h. credentials
10. authentication is achieved via physical i. and facial recognition
j. time and resource

LISTENING — Guess the answers. Listen to check.

1) It looks like login usernames and passwords are on ______


a. their way out
b. there way in
c. their ways out
d. their ways in
2) No longer will we have to worry about the security of our ______
a. login credentials
b. login green dentures
c. login creed entrails
d. log incredible shawls
3) used by web browsers and platforms for simpler and stronger ______
a. authenticity ration processes
b. authentic nation processes
c. authentic ration processes
d. authentication processes
4) allow website users to log in securely to their online accounts ______ device
a. using a digitally
b. using a digit all
c. using a digit tall
d. using a digital
5) biometrics (such as fingerprints and facial recognition) or USB ______
a. security keys
b. security quays
c. security quiz
d. security keeps

6) The WWWC spoke about the days of passwords ______


a. being numbed
b. being numb barred
c. being numb bed
d. being numbered
7) It's common knowledge that passwords have outlived ______
a. there ethics cases
b. their ethics racy
c. there efficacy
d. their efficacy
8) adopt Web Authentication to move beyond ______
a. vulnerability passwords
b. venerable passwords
c. vulnerable passwords
d. Vulcan able passwords
9) users are at less risk of having their passwords and ______
a. credential stolen
b. credentials stolen
c. credential stole in
d. credentials stole on
10) This is because login authentication is achieved via physical devices ______
a. of biometrics
b. or biometrics
c. on biometrics
d. ore biometrics

Listen again and fill in the gaps


It looks like login usernames and passwords are on (1) ___________________. No longer will we have to worry
about the security of (2) ___________________. They are set to be replaced by an infinitely more secure login system
known as Web Authentication. Web Authentication has become (3) ___________________ for logging in at the main
Internet standards body, the World Wide Web Consortium (WWWC). It is a system that will (4)
___________________ by web browsers and platforms for simpler and stronger authentication processes. It will
allow website users to (5) ___________________ to their online accounts using a digital device, biometrics (such as
fingerprints and facial recognition) or (6) ___________________.

The WWWC spoke about the days of (7) ___________________. A spokesperson said: "It's common knowledge that
passwords have outlived their efficacy. Not only are stolen, (8) ___________________ passwords behind 81 per cent
(9) ___________________, they are a drain of time and resources." It added: "Now is the time for web services and
businesses to adopt Web Authentication to (10) ___________________ passwords and help web users improve the
security of their online experiences," Web Authentication means users are (11) ___________________ of having their
passwords and credentials stolen. This is because login authentication is achieved via physical (12)
___________________ from our body.
ROLE PLAY (select one role and do the activity)

Role A – USB Drive


You think a USB drive is the most useful device. Tell the others three reasons why. Tell them what is wrong with their
devices. Also, tell the others which is the least useful of these (and why): a digital camera, a smart watch or a 3D
printer.

Role C – Smart Watch


You think a smart watch is the most useful device. Tell the others three reasons why. Tell them what is wrong with
their devices. Also, tell the others which is the least useful of these (and why): a digital camera, a USB drive or a 3D
printer.

Role B – Digital Camera


You think a digital camera is the most useful device. Tell the others three reasons why. Tell them what is wrong with
their devices. Also, tell the others which is the least useful of these (and why): a USB drive, a smart watch or a 3D
printer.

Role D – 3D Printer
You think a 3D printer is the most useful device. Tell the others three reasons why. Tell them what is wrong with their
devices. Also, tell the others which is the least useful of these (and why): a digital camera, a smart watch or a USB
drive.

SPELLING. Unscramble the underlined words

1. the security of our login dcteneiarls


2. fiinitnley more secure
3. become an ifocfail standard
4. stronger authentication roepssces
5. using a digital vedice
6. fingerprints and facial cnogiriteon
7. It's common lowkednge
8. stolen, weak or fduaelt passwords
9. 81 per cent of data aebcrehs
10. move beyond elnrubavle passwords
11. authentication is ciavehed
12. imbrteiocs from our body

Put the words in the right order

1. way their passwords on Usernames are and out .


2. our Worry of the login credentials . security about
3. infinitely Replaced secure by login an more system .
4. system will that A be universally used .
5. will allow website users to It log in .
6. about of days the passwords Spoke being numbered .
7. knowledge passwords Common outlived have that their efficacy .
8. of security the their Improve online experiences .
9. Authentication users Web at are means less risk .
10. achieved is authentication via Login physical devices

ACADEMIC WRITING. Comment of the following statement. (15 lines)

Passwords for computers and websites are not safe enough.

You might also like