Two-factor authentication /
Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). This book provides a compreh...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Ely, Cambridgeshire, United Kingdom :
It Governance Publishing,
2015.
|
Colección: | Fundamentals Series.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction; Everything old is new again; You've been using two-factor for years; Authentication security's naming problem; Looking down a road to greater adoption; Chapter 2: Risks to One-Factor Authentication; Our solutions are also our problems; Attacking password-only security; The 'fix' isn't just better passwords; Chapter 3: Understanding the Basics; In-band and out-of-band authentication; Generating one-time passwords; (a) Event-based; (b) Time-based; (c) Challenge response
- Chapter 4: Second-Factor TechnologiesA burgeoning world of options; Hardware-based OTP generation; SMS-based OTP delivery; Phone-call-based mechanisms; Geolocation-aware authentication; Push-notification-based authentication; Biometric authentication factors; Smartcard verification; Chapter 5: Standards and Regulations; One security control, many boxes checked; PCI DSS; HIPAA; FFIEC; India; Singapore; Chapter 6: Two Factor for Internet End-Users; Changing the face of two-factor adopters; Early end-user two-factor authentication; Google's impact on driving adoption
- Two-factor authentication and BitcoinFear, uncertainty and doubt; Choice in the marketplace; Chapter 7: Conclusion; Looking forward; The Internet of Things; In parting; References; ITG Resources