Question

I have noticed a movement toward two step verification among the companies I do business with--my...

I have noticed a movement toward two step verification among the companies I do business with--my investment and bank accounts are prime examples--where in addition to entering a password, I also have to enter a six digit code that is either texted to me or is available by opening an app on my cell phone.

Is multi-step verification going to be a bigger part of our future online?

Homework Answers

Answer #1

Single step authentication step(Tradition system):-
The password is created when you are register for that website for the first time or every time the login time,you need to remember the created password.
Password is a combination of letters and digits.
Strong password is a combination of at least one number and one capslock letter and one symbol with other letters and digits.
But it is not strong enough to secure the website.
It may be attacked by the third party members or the password can easily cracked by the attackers using the various methods such as Brute force attack,Dictionary attack and key logger attack.

Weak passwords:-
1) Anything that contains the word “password”, “admin”, “querty”, your name or variations of it
2) combinations of easy to guess numbers (“1234”, “1234567890”, “2016”, “0000”, “11111”
3) your spouse’s name, your children’s or pet’s name or birth dates etc.
4) The default password that your service provider gave to you.

So we are shifting to the 2 step authentication password verification:-
Two-Factor Authentication (2FA) is called as multiple factor authentication.Because it adds more level security to that existing system.
2FA is a method of verifying your identity that adds a second layer of authentication in addition to the account password of yours.
It reduces the chance of fraud,data theft or data loss.

Why is it important:-
Passwords is the mainstream form of authentication since the start of the digital revolution.
facts about traditional system:-
1) 90% of passwords that can be easily cracked in less than six hours.
2) 2/3's of people use the same password everywhere.
3) Cyber attackers have the power to test billions of passwords every second because of various available mechanisms and resources etc.

According to the study conducted by cybersecurity firm Symantec, 80% of data breaches could be eliminated/removed by the use of two-factor authentication.

Process of 2FA verification:-
1) When you want to sign into your any account, you are prompted with a username and a password – that’s the first verification layer(first authentication step).
2) After successfully login into the system,for more level of security,it asks to enter a email or mobile number to send the one time password or  Time-based One-time Password algorithm (TOTP).
3) OTP is sent via through offline message(SMS) or to your mail that is provided by the user.
3) If it is successfully entered and verified by that website,after it can completely login into the sytem.
4) Two-step verification will be requested for every login and at least once every 30 days.
5) Once the code is sent, the SMS verification code is valid for only 10 minutes. If you miss this timeframe,simply You can click on "Resend code" and you'll get a new, updated code sent via SMS or email.
6) OTP is 4,6 to 8 digits(example:-2332, 533426 etc ).


2FA hardware tokens:-
Hardware tokens for 2FA are available that is supporting different approaches to the authentication.
1) One popular hardware token is YubiKey, a small USB device that supports the one-time passwords (OTP),
2) public key encryption and authentication and
3) Universal 2nd Factor protocol developed by the FIDO Alliance.

The basic requirements of 2FA involve three different forms to identify and authenticate:-

1) These are something you know(knowledge factor):- a pin number, password or pattern.
2) something you have(possession factor):- an ATM or credit card, mobile phone or security token such as a key fob or USB token and
3) something you are(inherence factor):- Biometric authentication such as a voiceprint or fingerprint or keystroke dynamics or typing speed and mouse movements.

Applications of 2FA verification:-

1) Internet Banking
2) Google Authenticator or any social media websites.

Two-factor authentication is a must-have for:

1) Online banking
2) Online shopping (Amazon, PayPal etc– though it’s only available for a few countries)
3) E-Mail ( Yahoo, Outlook etc)
4) cloud storage accounts (Dropbox, Box, Sync etc)
5) Accounts on social networks such as Facebook, Twitter, Linkedin, Tumblr etc.
6) Productivity apps such as Evernote, Trello etc
7) Password managers Ex:-LastPass etc.
8) Communication apps such as Slack, Skype, MailChimp etc.

Some scenarios that would allow an attacker to break the 2FA verification:-

1. They could gain access to it means that they could steal your phone, your card, your token.
Text messages sent to your mobile phone can be easily identified.

2. Through the Man-in-the-Middle attack.
They could use the Trojan horse to change the communication between you and your web browser and launch the attack against 2FA.
Example:- Warcraft players uses this approach.

3. Real-time phishing

Conclusion:- 2FA verification is more secure than single step authentication.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
In narrative essay format, I want you to address a business/organization case study using multiple concepts...
In narrative essay format, I want you to address a business/organization case study using multiple concepts from class. The case question and case text begin on page 5 of this document. You need to demonstrate their best understanding of management and organizational behavior theory, and the application of those ideas to improve the understanding of various issues. You need to clearly identify at least 3 distinct, substantive issues. For each issue you need to 1), identify evidence from the case...
Wal-Mart Online Wal-Mart is one of the largest companies in America. It is definitely the largest...
Wal-Mart Online Wal-Mart is one of the largest companies in America. It is definitely the largest retailer, both in terms of the number of stores (8,970 worldwide in 2011) and the level of sales ($419 billion from the 2011 Annual Report). By pushing suppliers to continually reduce costs, Wal-Mart is known for pursuing low prices and the stores often attract customers solely in-terested in lower prices. With Wal-Mart’s expansion into groceries, the company has be-come the largest retail grocer in...
Chick-fil-A is dominating the U.S. fast-food market. Whereas McDonald’s, Subway, Burger King, and Taco Bell trudge...
Chick-fil-A is dominating the U.S. fast-food market. Whereas McDonald’s, Subway, Burger King, and Taco Bell trudge along at the top of the heap, Chick-fil-A has quietly risen from a South- east regional favorite to become the largest chicken chain and the eighth-largest quick-service food purveyor in the country. The chain sells significantly more food per restaurant than any of its competitors—twice that of Taco Bell or Wendy’s and more than three times what the KFC Colonel fries up. And it...
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation....
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation. case:    W17400 APIGEE: PEOPLE MANAGEMENT PRACTICES AND THE CHALLENGE OF GROWTH Ranjeet Nambudiri, S. Ramnarayan, and Catherine Xavier wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be...
2. SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to...
2. SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to be used as a basis for class discussion rather than as an illustration of the effective or ineffective handling of an administrative situation. The name of the company is disguised. INTRODUCTION In light of demographic concerns, in 2012, the Japanese government initiated an effort to change the work environment in order to secure the workforce of the future. Japan is world renowned for its...
What tools could AA leaders have used to increase their awareness of internal and external issues?...
What tools could AA leaders have used to increase their awareness of internal and external issues? ???ALASKA AIRLINES: NAVIGATING CHANGE In the autumn of 2007, Alaska Airlines executives adjourned at the end of a long and stressful day in the midst of a multi-day strategic planning session. Most headed outside to relax, unwind and enjoy a bonfire on the shore of Semiahmoo Spit, outside the meeting venue in Blaine, a seaport town in northwest Washington state. Meanwhile, several members of...