Inicio > > Seguridad informática > Two-Factor Authentication
Two-Factor Authentication

Two-Factor Authentication

Two-Factor Authentication

Mark Stanislav

24,48 €
IVA incluido
Disponible
Editorial:
IT Governance Publishing Ltd
Año de edición:
2015
Materia
Seguridad informática
ISBN:
9781849287326
24,48 €
IVA incluido
Disponible
Añadir a favoritos

Passwords are not enoughA password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it’s lost or stolen, it’s entirely useless at keeping information private.To secure your data properly, you also need to use a separate, secondary authentication factor.Data breaches are now commonplaceIn recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace.Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication.Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA).In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as ’what you have’, ’what you are’ and ’what you know’. Two-factor authentication relies on the combination of two of these factors.Product overviewTFA is nothing new. It’s mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards (’what you have’) and PINs (’what you know’). If you use online banking you’ll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP).What is new is TFA’s rising adoption beyond the financial sector.Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verificationAs well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT).Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you’re concerned about the security of your personal and financial data, you need to read this book.About the authorMark Stanislav is an information technology professional with over a decade’s varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7.Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark’s research, initiatives and insights on information security.

Artículos relacionados

  • Information Security and Ethics
    Quigley
    ...
    Disponible

    105,56 €

  • Cybersecurity Fundamentals Explained
    Brian Mackay
    The issue of Cybersecurity is of paramount importance in the digital age. With near-continuous revelations about incidents and breaches in the media, organizations and individuals are faced with the challenge of finding the balance between risk, innovation, and cost. At the same time, the field of cybersecurity is undergoing dramatic changes, demanding that organizations embrac...
    Disponible

    28,22 €

  • Cybersecurity for Everyone
    Edward Franklin
    'Cybersecurity for Everyone' is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks to preventing malware infections and ransomware attacks, this book equips readers with the knowledge and skills needed to prote...
    Disponible

    104,22 €

  • Improving Security, Privacy, and Trust in Cloud Computing
    Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud’s scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of chall...
    Disponible

    347,29 €

  • Enhancing Performance, Efficiency, and Security Through Complex Systems Control
    Academic scholars and professionals in engineering strive to enhance the performance, efficiency, and security of complex systems, but accessing comprehensive resources for these challenges can be daunting. Enhancing Performance, Efficiency, and Security Through Complex Systems Control offers an ideal solution. Edited by esteemed academics Idriss Chana, Aziz Bouazi, and Hussain...
    Disponible

    393,27 €

  • Cybersecurity for Everyone (Hardcover Edition)
    Edward Franklin
    'Cybersecurity for Everyone' is a user-friendly and accessible guide that teaches the fundamentals of cybersecurity and provides practical tips, tricks, and tools for enhancing online security and privacy. From identifying and avoiding phishing attacks to preventing malware infections and ransomware attacks, this book equips readers with the knowledge and skills needed to prote...
    Disponible

    102,87 €