Multi factor authentication as a necessary solution in the fight with information technology security threats

Authors

DOI:

https://doi.org/10.17770/etr2015vol3.183

Keywords:

authentication, authentication security testing, authentication factor, authentication security risk, identification, password

Abstract

In the publication multi factor authentication solutions are offered as a necessary tool for decrease of information technology security risks. The work includes description of authentication process from the viewpoint of information technology security aspect, as well as authentication factors are described, which can be used in authentication process modules. Some recommendations for decrease of security risks are given using multi factor authentication solutions. In the work a multi-factor authentication security testing experiment is described, which involves use of Linux remote console - SSH service. Analysis of data of unauthorised access efforts obtained during tests is described: it is determined from which countries or regions, as well as in which days there is the highest threat to information technology security.

Downloads

Download data is not yet available.

Author Biographies

  • Anita Jansone, Liepaja University
    Faculty of Science and Engineering
  • Kaspars Lauris, Liepaja University
    Faculty of Science and Engineering
  • Ivars Šaudinis, Liepaja University
    Faculty of Science and Engineering

References

Jansone A., Lauris K. Authentication solutions and security risks. International Joint Conferences on Computer, Information, Systems Sciences & Engineering (CISSE 14). 2014.

Stewart, J.M. Gibson, D. Chapple, M. Certified Information Systems Security Professional – Study Guide (Sixth Edition), Canada, John Wiley & Sons, 2012.

Lāce, Līva. Divpakāpju autentifikācija, [Online], Riga, CERT.LV - the Information Technology Security Incident Response Institution of the Republic of Latvia, presented at the 19/02/2013, Available: https://www.esidross.lv/2013/02/19/divpakapju-autentifikacija/

Pfleeger, C.P. Pfleeger, S.L. Analyzing Computer Security – A Threat/Vulnerability/Countermeasure Approach, USA, Pearson Education, 2012, pp.38–64.

Rubens, Paul. Biometric Authentication: How It Works. [Online]. presented at the 17/08/2012, Available: http://www.esecurityplanet.com/trends/biometric-authentication-how-it-works.html

Install Google Authenticator, Google, [Online], Available: https://support.google.com/accounts/answer/1066447?hl=en

Brute Forcing Passwords with ncrack, hydra and medusa. [Online], Available: http://hackertarget.com/brute-forcing-passwords-with-ncrack-hydra-and-medusa/

Burnett, Mark. 10,000 Top Passwords [Online], presented at the 20/06/2011, Available: https://xato.net/passwords/more-top-worst-passwords/#.VI7ZHnvLLCD

Kooser, Amanda. Worst passwords of 2014 are just as awful as you can imagine. [Online], presented at the 20/01/2015, Available: http://www.cnet.com/news/worst-passwords-of-2014-are-just-as-awful-as-you-can-imagine/

2014 Trustwave Global Security Report, Trustwave. [Online], Available: https://www.trustwave.com/Resources/Trustwave-Blog/The-2014-Trustwave-Global-Security-Report-Is-Here/

Eadicicco, Lisa. Passwords Are A Horrible Way To Keep Us Safe — Here Are The Potential Alternatives. [Online], presented at the 11/05/2014, Available: http://www.businessinsider.com/password-alternatives-2014-5

Downloads

Published

2015-06-16

How to Cite

[1]
A. Jansone, K. Lauris, and I. Šaudinis, “Multi factor authentication as a necessary solution in the fight with information technology security threats”, ETR, vol. 3, pp. 114–120, Jun. 2015, doi: 10.17770/etr2015vol3.183.