SlideShare a Scribd company logo
Sruthi krishna G
IIITMK
Email Security
Email 2 step Authentication
ο‚— Signing in to your account will work a little
differently
1.You'll enter your password
ο‚— Whenever you sign in to Google, you'll enter your
password as usual.
2.You'll be asked for something else
ο‚— Then, a code will be sent to your phone via text,
voice call, or our mobile app. Or, if you have a
Security Key, you can insert it into your
computer’s USB port.
Cont…
Keep sign-in simple
ο‚— During sign-in, you can choose not to use 2-Step
Verification again on that particular computer.
From then on, that computer will only ask for your
password when you sign in.
ο‚— You'll still be covered, because when you or
anyone else tries to sign in to your account
from another computer, 2-Step Verification will be
required.
How it will protect
An extra layer of security
ο‚— Most people only have one layer – their password – to
protect their account. With 2-Step Verification, if a
bad guy hacks through your password layer, he'll still
need your phone or Security Key to get into your
account.
Cont…
ο‚— Sign in will require something you know and
something you have
ο‚— With 2-Step Verification, you'll protect your account
with something you know (your password) and
something you have (your phone or Security Key).
Thank You…

More Related Content

DOCX
Two
PDF
Yours Advance Security Hood (Yash)
PDF
Smart Password
PDF
Poicy 121
PDF
120 i143
PPTX
Web security
PDF
How to Keep Yourself secure while browsing internet pre null meet kolkata
PPT
Web security
Two
Yours Advance Security Hood (Yash)
Smart Password
Poicy 121
120 i143
Web security
How to Keep Yourself secure while browsing internet pre null meet kolkata
Web security

What's hot (20)

PPTX
Web security
PPT
Web security
PPTX
Communication security
PDF
IRJET - Secure Banking Application with Image and GPS Location
PPTX
3d password
PDF
What-is-computer-security
PDF
Two factor authentication
PPT
Web spoofing (1)
PPT
Web spoofing
PPTX
3D password
PDF
The top 10 security issues in web applications
PPTX
Lock It Down, Keep It Safe
PPT
Class 8, 9 and 10
PDF
The Immune System of Internet
PPT
3 d password
PPT
Web Security
PPTX
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
PPTX
3d passwords
PPTX
3D PASSWORD
Web security
Web security
Communication security
IRJET - Secure Banking Application with Image and GPS Location
3d password
What-is-computer-security
Two factor authentication
Web spoofing (1)
Web spoofing
3D password
The top 10 security issues in web applications
Lock It Down, Keep It Safe
Class 8, 9 and 10
The Immune System of Internet
3 d password
Web Security
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
3d passwords
3D PASSWORD
Ad

Similar to Email security (20)

PPTX
Basic mobile and internet security
PDF
3 Ways to Protect the Data in Your Google Account
PDF
Web Authn & Security Keys: Unlocking the Key to Authentication
PDF
INSTAGRAM – HACKING AND PREVENTION TIPS
PPTX
Two factor autentication in Gmail
PPTX
How to use microsoft authenticator app
PDF
Ouch 201211 en
PDF
Securing corporate assets_with_2_fa
PDF
Google Prompt Feature
PPTX
Set up a new enum r
PPTX
Set up a new enum with eskytel
PPTX
Webinar: Personal Online Privacy - Sucuri Security
PPTX
Security Awareness 101
PPTX
Web application security
PPTX
Ways to protect From Keyloggers!
PDF
Two factor authentication_procedure
PDF
Modicare Mighty Guard
DOCX
More Issues on Digital Identity (24Feb2023)
PDF
3 Ways to Protect the Data in Your Apple Account
PPTX
Two factor authentication end user guide
Basic mobile and internet security
3 Ways to Protect the Data in Your Google Account
Web Authn & Security Keys: Unlocking the Key to Authentication
INSTAGRAM – HACKING AND PREVENTION TIPS
Two factor autentication in Gmail
How to use microsoft authenticator app
Ouch 201211 en
Securing corporate assets_with_2_fa
Google Prompt Feature
Set up a new enum r
Set up a new enum with eskytel
Webinar: Personal Online Privacy - Sucuri Security
Security Awareness 101
Web application security
Ways to protect From Keyloggers!
Two factor authentication_procedure
Modicare Mighty Guard
More Issues on Digital Identity (24Feb2023)
3 Ways to Protect the Data in Your Apple Account
Two factor authentication end user guide
Ad

Recently uploaded (20)

PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
DOCX
Unit-3 cyber security network security of internet system
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Testing WebRTC applications at scale.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Digital Literacy And Online Safety on internet
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
innovation process that make everything different.pptx
PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PPTX
Internet___Basics___Styled_ presentation
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
QR Codes Qr codecodecodecodecocodedecodecode
Tenda Login Guide: Access Your Router in 5 Easy Steps
Slides PDF The World Game (s) Eco Economic Epochs.pdf
international classification of diseases ICD-10 review PPT.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
Unit-3 cyber security network security of internet system
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Testing WebRTC applications at scale.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Digital Literacy And Online Safety on internet
The New Creative Director: How AI Tools for Social Media Content Creation Are...
innovation process that make everything different.pptx
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
Internet___Basics___Styled_ presentation
An introduction to the IFRS (ISSB) Stndards.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Introuction about WHO-FIC in ICD-10.pptx
SAP Ariba Sourcing PPT for learning material
Decoding a Decade: 10 Years of Applied CTI Discipline

Email security

  • 2. Email 2 step Authentication ο‚— Signing in to your account will work a little differently 1.You'll enter your password ο‚— Whenever you sign in to Google, you'll enter your password as usual. 2.You'll be asked for something else ο‚— Then, a code will be sent to your phone via text, voice call, or our mobile app. Or, if you have a Security Key, you can insert it into your computer’s USB port.
  • 3. Cont… Keep sign-in simple ο‚— During sign-in, you can choose not to use 2-Step Verification again on that particular computer. From then on, that computer will only ask for your password when you sign in. ο‚— You'll still be covered, because when you or anyone else tries to sign in to your account from another computer, 2-Step Verification will be required.
  • 4. How it will protect An extra layer of security ο‚— Most people only have one layer – their password – to protect their account. With 2-Step Verification, if a bad guy hacks through your password layer, he'll still need your phone or Security Key to get into your account.
  • 5. Cont… ο‚— Sign in will require something you know and something you have ο‚— With 2-Step Verification, you'll protect your account with something you know (your password) and something you have (your phone or Security Key).