Cargando…

Two-factor authentication /

Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). This book provides a compreh...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stanislav, Mark (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, United Kingdom : It Governance Publishing, 2015.
Colección:Fundamentals Series.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_ocn928751204
003 OCoLC
005 20231005004200.0
006 m o d
007 cr unu||||||||
008 151111s2015 enk ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d S9I  |d YDXCP  |d HEBIS  |d B24X7  |d STF  |d OCLCF  |d COO  |d JSTOR  |d D6H  |d FVL  |d LIV  |d MERUC  |d OCLCQ  |d IOG  |d CEF  |d OCLCQ  |d WYU  |d LVT  |d UAB  |d N$T  |d VLY  |d UX1  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 919344227  |a 1162264448  |a 1175635589 
020 |a 1849287341  |q (electronic bk.) 
020 |a 9781849287340  |q (electronic bk.) 
020 |a 9781849287333  |q (electronic bk.) 
020 |a 1849287333  |q (electronic bk.) 
020 |a 1849287325 
020 |a 9781849287326 
027 |a JSTOR purchased 
029 1 |a AU@  |b 000062511033 
029 1 |a GBVCP  |b 1048972925 
029 1 |a GBVCP  |b 897170482 
035 |a (OCoLC)928751204  |z (OCoLC)919344227  |z (OCoLC)1162264448  |z (OCoLC)1175635589 
037 |a CL0500000670  |b Safari Books Online 
037 |a 22573/ctt155kj55  |b JSTOR 
050 4 |a QA76.9 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Stanislav, Mark,  |e author. 
245 1 0 |a Two-factor authentication /  |c Mark Stanislav. 
264 1 |a Ely, Cambridgeshire, United Kingdom :  |b It Governance Publishing,  |c 2015. 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Fundamentals Series ;  |v v. 4 
588 0 |a Online resource; title from title page (Safari, viewed November 6, 2015). 
504 |a Includes bibliographical references. 
520 |a Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). This book provides a comprehensive evaluation of popular secondary authentication methods, such as: hardware-based OTP generation; SMS-based OTP delivery; phone call-based mechanisms; geolocation-aware authentication; push notification-based authentication; biometric authentication factors; smart card verification. As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. --  |c Edited summary from book. 
505 0 |a Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction; Everything old is new again; You've been using two-factor for years; Authentication security's naming problem; Looking down a road to greater adoption; Chapter 2: Risks to One-Factor Authentication; Our solutions are also our problems; Attacking password-only security; The 'fix' isn't just better passwords; Chapter 3: Understanding the Basics; In-band and out-of-band authentication; Generating one-time passwords; (a) Event-based; (b) Time-based; (c) Challenge response 
505 8 |a Chapter 4: Second-Factor TechnologiesA burgeoning world of options; Hardware-based OTP generation; SMS-based OTP delivery; Phone-call-based mechanisms; Geolocation-aware authentication; Push-notification-based authentication; Biometric authentication factors; Smartcard verification; Chapter 5: Standards and Regulations; One security control, many boxes checked; PCI DSS; HIPAA; FFIEC; India; Singapore; Chapter 6: Two Factor for Internet End-Users; Changing the face of two-factor adopters; Early end-user two-factor authentication; Google's impact on driving adoption 
505 8 |a Two-factor authentication and BitcoinFear, uncertainty and doubt; Choice in the marketplace; Chapter 7: Conclusion; Looking forward; The Internet of Things; In parting; References; ITG Resources 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Computers  |x Access control  |x Passwords. 
650 0 |a Computers  |x Access control  |x Keystroke timing authentication. 
650 0 |a Digital signatures. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle  |x Mots de passe. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle  |x Authentification par dynamique de frappe au clavier. 
650 6 |a Signature numérique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Access control  |x Keystroke timing authentication  |2 fast 
650 7 |a Computers  |x Access control  |x Passwords  |2 fast 
650 7 |a Digital signatures  |2 fast 
776 0 8 |i Print version:  |a Stanislav, Mark.  |t Two-factor authentication.  |d Cambridgeshire, England : IT Governance Publishing, ©2015  |h 104 pages  |z 9781849287326 
830 0 |a Fundamentals Series. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt15hvwnz  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00093179 
938 |a EBSCOhost  |b EBSC  |n 1030095 
938 |a YBP Library Services  |b YANK  |n 12588542 
938 |a YBP Library Services  |b YANK  |n 12535323 
994 |a 92  |b IZTAP