This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Mark Stanislav is an information technology professional with over a decade’s varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7.
Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon, and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace, and The Register have featured Mark’s research, initiatives, and insights on information security.
Mark earned both his Bachelor of Science Degree in Networking & IT Administration and his Master of Science Degree in Technology Studies, focused on Information Assurance, from Eastern Michigan University. He also holds CISSP, Security+, Linux+, and CCSK certifications.
Passwords are not enough
A password is a single authentication factor – anyone who has it can use it. No matter how strong it is, if it’s lost or stolen it’s entirely useless at keeping private information private.In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information – including password data – has become commonplace.
Add to this the fact that rapidly evolving password-cracking technology and the habitual use – and reuse – of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for two-factor authentication (TFA or 2FA).
Two-Factor Authentication evaluates popular secondary authentication methods such as hardware-based one-time password (OTP) generation, SMS-based OTP delivery, phone call-based mechanisms, geolocation-aware authentication, push notification-based authentication, biometric authentication factors and smart card verification, as well as MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security).
Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. To secure your data properly, you also need to use a separate, secondary authentication factor. If you’re concerned about the security of your personal and financial data, you need to read this book.
About the author
Mark Stanislav has over a decade’s varied experience in systems administration, web application development and information security. A senior security consultant for the Strategic Services team at Rapid7, Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon, and THOTCON, and has featured in news media including the Wall Street Journal, Al Jazeera America, Fox Business and CNN Money. Mark holds CISSP, Security+, Linux+, and CCSK certifications.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: HPB-Red, Dallas, TX, USA
paperback. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_436146035
Anzahl: 1 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Bestandsnummer des Verkäufers LW-9781849287326
Anzahl: 15 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 114 pages. 7.70x5.00x0.50 inches. In Stock. Bestandsnummer des Verkäufers zk1849287325
Anzahl: 1 verfügbar
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
Paperback. Zustand: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Bestandsnummer des Verkäufers C9781849287326
Anzahl: Mehr als 20 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used.Über den Aut. Bestandsnummer des Verkäufers 464984981
Anzahl: Mehr als 20 verfügbar