Normal view MARC view ISBD view

Two-factor authentication / Mark Stanislav.

By: Stanislav, Mark [author.].
Material type: TextTextSeries: JSTOR eBooks.Publisher: Ely, Cambridgeshire, United Kingdom : It Governance Publishing, 2015Description: 1 online resource (1 volume).Content type: text Media type: computer Carrier type: online resourceISBN: 1849287341; 9781849287340; 9781849287333; 1849287333; 1849287325; 9781849287326.Subject(s): Computers -- Access control -- Passwords | Computers -- Access control -- Keystroke timing authentication | Digital signaturesGenre/Form: Electronic books.Additional physical formats: Print version:: Two-factor authentication.DDC classification: 005.8 Online resources: Click here to view this ebook. Summary: Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). This book provides a comprehensive evaluation of popular secondary authentication methods, such as: hardware-based OTP generation; SMS-based OTP delivery; phone call-based mechanisms; geolocation-aware authentication; push notification-based authentication; biometric authentication factors; smart card verification. As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. -- Edited summary from book.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9 (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://www.jstor.org/stable/10.2307/j.ctt15hvwnz Available ocn928751204

Description based on online resource; title from title page (Safari, viewed November 6, 2015).

Includes bibliographical references.

Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). This book provides a comprehensive evaluation of popular secondary authentication methods, such as: hardware-based OTP generation; SMS-based OTP delivery; phone call-based mechanisms; geolocation-aware authentication; push notification-based authentication; biometric authentication factors; smart card verification. As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. -- Edited summary from book.

There are no comments for this item.

Log in to your account to post a comment.