Two-factor authentication /
Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). This book provides a compreh...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ely, Cambridgeshire, United Kingdom :
It Governance Publishing,
2015.
|
Colección: | Fundamentals Series.
|
Temas: | |
Acceso en línea: | Texto completo |
Sumario: | Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). This book provides a comprehensive evaluation of popular secondary authentication methods, such as: hardware-based OTP generation; SMS-based OTP delivery; phone call-based mechanisms; geolocation-aware authentication; push notification-based authentication; biometric authentication factors; smart card verification. As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. -- |
---|---|
Descripción Física: | 1 online resource (1 volume) |
Bibliografía: | Includes bibliographical references. |
ISBN: | 1849287341 9781849287340 9781849287333 1849287333 1849287325 9781849287326 |