波音游戏-波音娱乐城赌球打不开

Multifactor Authentication: An Overview

by Yuki Tam (OCIO)


Over the past few decades, systems and their data were protected by usernames (IDs) and passwords. However, this is not considered as safe anymore. An attacker can impersonate a user easily when a password or the password database is stolen. Even if the passwords are safely kept, an attacker can still crack a password by trying many passwords in the hope of guessing a correct one (also known as brute-force attack). Nowadays, the low hardware cost and high hardware performance make password cracking much less tedious than before, for example, cracking a 9-character alphanumeric with special character password would only take few hours.

Technology

Instead of using the password alone for authentication, multifactor authentication (MFA) is introduced, where users have to present 2 or more factors during the authentication process. With multifactor authentication in place, the difficulty for an attacker to impersonate a user is significantly increased: even if one authentication factor is compromised, the attacker has to get the rest of the authentication factors correct before he/she can impersonate a user and access the system.

The most common factors are:

  • Knowledge factor (something you know)
    • User name
    • Date of birth
    • Answer to security questions
  • Possession factor (something you have)
    • Hardware token
      A hardware tool that generates a one-time password
    • Software token
      A mobile application installed on smartphone or computer that generates a login request or a one-time password
    • Mobile phone
      To receive a one-time password over SMS
    • Personal certificate
      It is usually stored in a USB drive. User has to insert the USB drive to the device during authentication.
  •  ?Inherence factor (something you are)
    • Fingerprint
    • Hand Geometry
    • Pattern of the retina
    • Pattern of the iris
    • Voice
    • Facial expression

There are also two less common factors:

  • ?Time factor
    Users can only access the system during a specific period, e.g. office hours, or the access rights would be expired after certain period, e.g. 15 minutes.
  • ?Location factor
    Systems can only be accessed from certain countries (e.g. its home country).

 

Application

As each authentication factor adds an extra layer of protection to the authentication process that can help to defend against impersonation and data theft, multifactor authentication is widely adopted in critical systems.

Examples of use in our daily lives are:

  • Online banking system
    You are asked to provide your account password (something you know), an answer to a security question (something you know) and a one-time password generated by your token (something you have)
  • ?The e-Channel service of the Immigration Department
    You have to present your HKID (something you have) and fingerprint (something you are)

And some single-factor authenticated systems would turn to multifactor authentication systems when abnormal behaviour is detected. For example, when the system receives a logon request originating from a new device or unusual country, the user then has to provide an additional factor for identity verification.

With the growing number of cloud applications as well as the wide adoption of information technology in business, we believe that the application of MFA will become increasingly commonplace and more advanced yet user-friendly authentication factors will evolve in the near future.

Reference

  1. ?A tool that estimates the time needed to crack a password (https://www.betterbuys.com/estimating-password-cracking-times/)
 

??????

百家乐官网的路怎样看| 百家乐官网赌博凯时娱乐| 百家乐官网买隔一数| 飞天百家乐的玩法技巧和规则| 百家乐官网鸿泰棋牌| 新葡京百家乐的玩法技巧和规则| 扑克王百家乐官网的玩法技巧和规则| 百家乐官网外挂程式| 二八杠怎么赢钱| 百家乐官网游戏机说明书| 闲和庄百家乐娱乐| 南京百家乐官网的玩法技巧和规则| 大发888娱乐登录| 玩百家乐保时捷娱乐城| 亚洲百家乐官网的玩法技巧和规则 | 百家乐官网单打| 大发888怎么注册| 百家乐网站新全讯网| 香港百家乐官网娱乐场开户注册| 太阳城音乐广场| 澳门百家乐会出老千吗| 捷豹百家乐官网娱乐城| 百家乐官网21点游戏| 大连棋牌网| 恒利百家乐的玩法技巧和规则 | 真人百家乐官网赌城| 百家乐官网最常见的路子| 湘阴县| 金道博彩| 大发888下注| 大发888在线娱乐游戏| 真钱百家乐开户试玩| 属虎与属鼠做生意好吗| 喜来登百家乐官网的玩法技巧和规则 | 百家乐官网如何打轮盘| 百家乐官网开发软件| 大发888备用网址大全| 伯爵百家乐娱乐网| 百家乐www| 2404这个房号 风水| 百家乐官网斗地主|