Multi factor authentication as a necessary solution in the fight with information technology security threats

Anita Jansone, Kaspars Lauris, Ivars Šaudinis

Abstract


In the publication multi factor authentication solutions are offered as a necessary tool for decrease of information technology security risks. The work includes description of authentication process from the viewpoint of information technology security aspect, as well as authentication factors are described, which can be used in authentication process modules. Some recommendations for decrease of security risks are given using multi factor authentication solutions. In the work a multi-factor authentication security testing experiment is described, which involves use of Linux remote console - SSH service. Analysis of data of unauthorised access efforts obtained during tests is described: it is determined from which countries or regions, as well as in which days there is the highest threat to information technology security.

Keywords


authentication; authentication security testing; authentication factor; authentication security risk; identification; password

Full Text:

PDF

References


Jansone A., Lauris K. Authentication solutions and security risks. International Joint Conferences on Computer, Information, Systems Sciences & Engineering (CISSE 14). 2014.

Stewart, J.M. Gibson, D. Chapple, M. Certified Information Systems Security Professional – Study Guide (Sixth Edition), Canada, John Wiley & Sons, 2012.

Lāce, Līva. Divpakāpju autentifikācija, [Online], Riga, CERT.LV - the Information Technology Security Incident Response Institution of the Republic of Latvia, presented at the 19/02/2013, Available: https://www.esidross.lv/2013/02/19/divpakapju-autentifikacija/

Pfleeger, C.P. Pfleeger, S.L. Analyzing Computer Security – A Threat/Vulnerability/Countermeasure Approach, USA, Pearson Education, 2012, pp.38–64.

Rubens, Paul. Biometric Authentication: How It Works. [Online]. presented at the 17/08/2012, Available: http://www.esecurityplanet.com/trends/biometric-authentication-how-it-works.html

Install Google Authenticator, Google, [Online], Available: https://support.google.com/accounts/answer/1066447?hl=en

Brute Forcing Passwords with ncrack, hydra and medusa. [Online], Available: http://hackertarget.com/brute-forcing-passwords-with-ncrack-hydra-and-medusa/

Burnett, Mark. 10,000 Top Passwords [Online], presented at the 20/06/2011, Available: https://xato.net/passwords/more-top-worst-passwords/#.VI7ZHnvLLCD

Kooser, Amanda. Worst passwords of 2014 are just as awful as you can imagine. [Online], presented at the 20/01/2015, Available: http://www.cnet.com/news/worst-passwords-of-2014-are-just-as-awful-as-you-can-imagine/

2014 Trustwave Global Security Report, Trustwave. [Online], Available: https://www.trustwave.com/Resources/Trustwave-Blog/The-2014-Trustwave-Global-Security-Report-Is-Here/

Eadicicco, Lisa. Passwords Are A Horrible Way To Keep Us Safe — Here Are The Potential Alternatives. [Online], presented at the 11/05/2014, Available: http://www.businessinsider.com/password-alternatives-2014-5




DOI: http://dx.doi.org/10.17770/etr2015vol3.183

Refbacks

  • There are currently no refbacks.


SCImago Journal & Country Rank