Multi-factor safety, a guide for beginners

A multifaceted approach to computer security is important, such as using a combination of security devices in your home (doors, windows, alarms, cameras).

This means you are using software s from viruses, firewall, ensuring that your operating system is up-to-date because they are on the lookout for dangerous websites and phishing attack attempts.

Passwords

Another key element of cyber security is having a strong password. Experts recommend using a password that is at least 8 characters long and contains a combination of alphanumeric characters. This means that it must contain lowercase and uppercase letters, numbers and symbols (such as # ?! * +).

Early computer systems were easily compromised by having weak passwords such as "admin" or "admin"Password".

Going to any office you will probably find a notepad with a computer password in at least one office. This is often because people have difficulty remembering passwords such as H4fTnQ91ifW, and therefore have to write them down. A more secure solution would be to use a password management tool such as Keypass, however, it is relatively unknown among techies.

The solution - Multi-factor security

One solution to the password problem is multi-factor security. Sometimes referred to as “two-factor security” or “two-factor authentication”. This is a system where one must enter a third piece of information in order to connect.

Instead of being a static character string to be kept in the user's mind, this system creates a unique password that can only be used once. Popular examples include Google Verifier which generates a unique six-digit code every 30 seconds and is generated by the user's phone.

Using a multi-factor security system, a hacker may still not be able to access an account, even if it has a username and password.

The security of many factors has been widely adopted in recent years. It is possible to secure your online accounts with almost all major websites using this system. This includes social networks such as Facebook and gambling sites that use the popular validation technique SMS, while many large banks such as HSBC use a separate physics .

The future of multi-factor security

While the security of many factors has already been successfully applied to many internet, security experts and the public can not be satisfied.

The improved security devices at they force thieves to change their approach from breaking into the vehicle itself to stealing keys from homes and unlocking the car that way. In the same way, multi-factor security forces criminals to change their approach.

The FBI recently released a that hackers are increasing their efforts to develop attacks that disable multi-factor security or by transferring the victim's phone number to a SIM card that ν, ώστε να μπορούν να λαμβάνουν κωδικούς ελέγχου ταυτότητας μέσω SMS. Άλλες τεχνικές που αναφέρονται από το FBI περιλαμβάνουν μια προσέγγιση που αντιγράφει τα cookies μιας συνεδρίας από τον υπολογιστή του θύματος, έτσι ώστε να μπορούν να τα επαναχρησιμοποιήσουν στο δικό τους .

Therefore, a key battle in the future of multi-factor security will be to find and close these vulnerabilities before hackers can apply them. This is something that security experts have achieved so far.

Push Notifications

Facebook and Google use notifications push as a method of authentication by users in recent years. If you sign in to a Google Account, a pop-up window will appear on your smartphone asking if you are signed in.

They will probably be released on more systems in the coming years. They are cheaper than the physical devices still used by many banks and are also much more secure than SMS codes. The United States National Institute of Standards and Technology (NIST) recently announced that SMS authentication should be discontinued in the coming years.

Biometrics

Smartphones and some computers use biometrics like fingerprints and face recognition to allow us to connect to our computers for several years. However, they are unlikely to become a critical part of the safety of many factors.

A lot have turned off fingerprint scanners on devices they supply to their staff for many years because they are easily bypassed.

NIST says biometrics should be used alongside another form of multi-factor security, as well as one can be easily photographed without their permission or fingerprinted from an object that users touch. Therefore, biometrics are not secret and are not strong enough to protect important data.

Multi-factor security has been a critical tool in the fight against cyber-attackers, and its effectiveness is being demonstrated by efforts to develop solutions to circumvent it.

We may see an increase in push notification systems in the future, along with SMS. However, it is unlikely that biometrics are based solely on the safety of our devices.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).