Limit search to available items
Book Cover
E-book
Author Stanislav, Mark, author

Title Two-factor authentication / Mark Stanislav
Published Ely, Cambridgeshire, United Kingdom : It Governance Publishing, 2015

Copies

Description 1 online resource (1 volume)
Series Fundamentals Series ; v. 4
Fundamentals Series
Contents Foreword; Preface; About the Author; Acknowledgements; Contents; Chapter 1: Introduction; Everything old is new again; You've been using two-factor for years; Authentication security's naming problem; Looking down a road to greater adoption; Chapter 2: Risks to One-Factor Authentication; Our solutions are also our problems; Attacking password-only security; The 'fix' isn't just better passwords; Chapter 3: Understanding the Basics; In-band and out-of-band authentication; Generating one-time passwords; (a) Event-based; (b) Time-based; (c) Challenge response
Chapter 4: Second-Factor TechnologiesA burgeoning world of options; Hardware-based OTP generation; SMS-based OTP delivery; Phone-call-based mechanisms; Geolocation-aware authentication; Push-notification-based authentication; Biometric authentication factors; Smartcard verification; Chapter 5: Standards and Regulations; One security control, many boxes checked; PCI DSS; HIPAA; FFIEC; India; Singapore; Chapter 6: Two Factor for Internet End-Users; Changing the face of two-factor adopters; Early end-user two-factor authentication; Google's impact on driving adoption
Two-factor authentication and BitcoinFear, uncertainty and doubt; Choice in the marketplace; Chapter 7: Conclusion; Looking forward; The Internet of Things; In parting; References; ITG Resources
Summary Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). This book provides a comprehensive evaluation of popular secondary authentication methods, such as: hardware-based OTP generation; SMS-based OTP delivery; phone call-based mechanisms; geolocation-aware authentication; push notification-based authentication; biometric authentication factors; smart card verification. As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. -- Edited summary from book
Bibliography Includes bibliographical references
Notes English
Online resource; title from title page (Safari, viewed November 6, 2015)
Subject Computers -- Access control -- Passwords.
Computers -- Access control -- Keystroke timing authentication.
Digital signatures.
COMPUTERS -- Security -- General.
Computers -- Access control -- Keystroke timing authentication
Computers -- Access control -- Passwords
Digital signatures
Form Electronic book
ISBN 1849287341
9781849287340
9781849287333
1849287333
1849287325
9781849287326