Write review about article - two-factor authentication

Assignment Help Computer Engineering
Reference no: EM131932740

Write review about this article with references in APA format

In our world today, one cannot deny the impact that the Internet has on all aspects of our society and security is more thought of today during software designs. Two-factor authentication is mostly based on the concept of something you know, something you have, something you are and where you are.

Two-factor authentication also known as 2FA is one of the greatest means of improving an online security account. Fortunately, most websites have adopted this new security measure and it has become a lot more common on the web today, adding an extra layer of security to our accounts online. Incorporating any of these two methods together will provide a higher level of security to a website or software, making compromise harder.

Using a password in combination with images and games can help strengthen the security of a website but care should be taken when combining authentication types that are not common because of user rejection.

This goes back to the CIA triad where an increase in one could affect the other. Our objective is simply to permit the right amount of security. But more security features will almost always influence the ease of use. To provide a true dependable two-way authentication between humans and computers a CAPTCHA is a wildly accepted method. By combining CAPTCHA with other forms of authentication, true human authentication can be achieved.

A middleperson attack simply is like listening in on a conversation between two systems. When information is sent from a system to a server or website, anyone along the path of that information such as an ISP can be able to intercept that information or even modify it. Detecting a middleperson attack can be very difficult and the best solution is preventing it.

The most common solution is the use of VPNs which provides encryption for your data passing through your ISP. On the down side, if you are using a commercially available or paid VPN service, they too can be able to employ a middleperson attack. The best solution to middleperson attack will be end-to-end encryption.

This method is the best but also not feasible on all websites since we cannot implement encryption on systems we do not own. In the book of Proverbs 25:2 it says, "It is the glory of God to conceal a thing: but the honor of kings is to search out a matter".

References Anderson, R.J. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.). Hoboken, NJ: Wiley. ISBN: 9780470068526. Two-factor authentication. (2007, October). Database and Network Journal, 37(5), 26.

Verified Expert

This task presents the review of the article provided, which is based on the security on internet and two factor authentication. In this task the article has been reviewed in 150 words using APA reference.

Reference no: EM131932740

Questions Cloud

Discuss the importance of community health : How does what you observed in your own community relate to what you read about in Chapter 3 of Global Pubic Heath this week as far as the importance.
Find the sample mean of observations : A random sample of nine observations are drawn from the population, and we find the sample mean of these observations is = 17. The P-value is closest to
Compare and contrast dna and rna : Discuss why humans did not evolve with one central repository of DNA, but rather it is replicated throughout the body?
Explain the mission of your organization : Explain the mission of your organization. What value you add to the organization and what role Christianity currently plays in this organization.
Write review about article - two-factor authentication : Write review about this article with references -In our world today, one cannot deny the impact that the Internet has on all aspects of our society and security
The person selling the investment : If you calculate that the present value of this investment is $35,000, who is using the higher interest rate, you or the person selling the investment?
What is the most you would pay today for fanshawe stock : If investments with the same risk as Fanshawe's stock have an expected return of 10.75%, what is the most you would pay today for Fanshawe's Stock?
What are the tariff or non-tariff trade barriers : What are some specific examples of tariff or non-tariff trade barriers? Examine the impacts of tariff or non-trade barriers on the global trading system.
Which investment has the lower IRR : The NPV of M is lower than the NPV of N at a required return of 14%, which investment has the lower IRR?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd