0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Two-Factor Authentication (Paperback) Loot Price: R543
Discovery Miles 5 430
Two-Factor Authentication (Paperback): Mark Stanislav

Two-Factor Authentication (Paperback)

Mark Stanislav; Edited by It Governance Publishing

 (sign in to rate)
Loot Price R543 Discovery Miles 5 430

Bookmark and Share

Expected to ship within 12 - 17 working days

Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.

General

Imprint: It Governance Publishing
Country of origin: United Kingdom
Release date: April 2015
Authors: Mark Stanislav
Editors: It Governance Publishing
Dimensions: 198 x 129 x 6mm (L x W x T)
Format: Paperback
Pages: 114
ISBN-13: 978-1-84928-732-6
Categories: Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 1-84928-732-5
Barcode: 9781849287326

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,774 R1,415 Discovery Miles 14 150
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,290 Discovery Miles 12 900
PCI Dss: A Pocket Guide
IT Governance Paperback R425 Discovery Miles 4 250
Well Aware - Master the Nine…
George Finney Hardcover R689 Discovery Miles 6 890
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R695 Discovery Miles 6 950
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R7,074 Discovery Miles 70 740
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,848 Discovery Miles 88 480
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,766 Discovery Miles 67 660
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,388 Discovery Miles 13 880
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,766 Discovery Miles 67 660
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R9,061 Discovery Miles 90 610
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,083 R933 Discovery Miles 9 330

See more

Partners