Two-Factor Authentication
()
About this ebook
This book discusses the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organisations and individuals would want to use two factor, and core milestones in the progress of growing the market.
Mark Stanislav
Mark Stanislav is an information technology professional with over a decade’s varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon, and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace, and The Register have featured Mark’s research, initiatives, and insights on information security. Mark earned both his Bachelor of Science Degree in Networking & IT Administration and his Master of Science Degree in Technology Studies, focused on Information Assurance, from Eastern Michigan University. He also holds CISSP, Security+, Linux+, and CCSK certifications.
Related to Two-Factor Authentication
Titles in the series (7)
Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsBuild a Security Culture Rating: 0 out of 5 stars0 ratingsReviewing IT in Due Diligence: Are you buying an IT asset or liability Rating: 0 out of 5 stars0 ratingsTwo-Factor Authentication Rating: 0 out of 5 stars0 ratingsThe Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 5 out of 5 stars5/5Fundamentals of Information Security Risk Management Auditing: An introduction for managers and auditors Rating: 5 out of 5 stars5/5Fundamentals of Assurance for Lean Projects Rating: 0 out of 5 stars0 ratings
Related ebooks
Hacking Multifactor Authentication Rating: 0 out of 5 stars0 ratingsSecurity Architect: Careers in information security Rating: 4 out of 5 stars4/5Cyber Security and the Future of Digital Payments Rating: 0 out of 5 stars0 ratingsCybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsPractical Network Security: An auditee’s guide to zero findings Rating: 0 out of 5 stars0 ratingsEnterprise Security: A Data-Centric Approach to Securing the Enterprise Rating: 0 out of 5 stars0 ratingsMobile Security Fundamentals: A Guide for CompTIA Security+ 601 Exam Rating: 0 out of 5 stars0 ratingsMobile Computing: Securing your workforce Rating: 0 out of 5 stars0 ratingsCyber Curiosity: A Beginner's Guide to Cybersecurity Rating: 0 out of 5 stars0 ratingsIT Security Concepts Rating: 5 out of 5 stars5/5Cybersecurity Experts Rating: 0 out of 5 stars0 ratingsThe Art of Email Security: Putting Cybersecurity In Simple Terms Rating: 2 out of 5 stars2/5#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Security Essentials Rating: 5 out of 5 stars5/5Cyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsWeb Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 SSCP CBK Reference Rating: 0 out of 5 stars0 ratingsCYBER SECURITY HANDBOOK Part-2: Lock, Stock, and Cyber: A Comprehensive Security Handbook Rating: 0 out of 5 stars0 ratingsCYBER SECURITY HANDBOOK Part-1: Hacking the Hackers: Unraveling the World of Cybersecurity Rating: 0 out of 5 stars0 ratingsHow to Implement Artificial Intelligence and Cybersecurity in Modern Businesses Rating: 0 out of 5 stars0 ratingsSecurity Engineering: A Guide to Building Dependable Distributed Systems Rating: 4 out of 5 stars4/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5AZURE AZ 500 STUDY GUIDE-1: Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500 Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Cracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5Codes and Ciphers Rating: 5 out of 5 stars5/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsUnmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5CISA Certified Information Systems Auditor Study Guide Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Rating: 3 out of 5 stars3/5
Reviews for Two-Factor Authentication
0 ratings0 reviews
Book preview
Two-Factor Authentication - Mark Stanislav
Two-Factor Authentication
Two-Factor
Authentication
MARK STANISLAV
Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher and the author cannot accept responsibility for any errors or omissions, however caused. Any opinions expressed in this book are those of the author, not the publisher. Websites identified are for reference only, not endorsement, and any website visits are at the reader’s own risk. No responsibility for loss or damage occasioned to any person acting, or refraining from action, as a result of the material in this publication can be accepted by the publisher or the author.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form, or by any means, with the prior permission in writing of the publisher or, in the case of reprographic reproduction, in accordance with the terms of licenses issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publishers at the following address:
IT Governance Publishing
IT Governance Limited
Unit 3, Clive Court
Bartholomew’s Walk
Cambridgeshire Business Park
Ely, Cambridgeshire
CB7 4EA
United Kingdom
www.itgovernance.co.uk
© Mark Stanislav 2015
The author has asserted the rights of the author under the Copyright, Designs, and Patents Act, 1988, to be identified as the author of this work.
First published in the United Kingdom in 2015
by IT Governance Publishing
ISBN 978-1-84928-734-0
FOREWORD
If there is a more hated, feared, or otherwise misunderstood word associated with information technology than ‘password’, I don’t know it.
My authentication-security baptism occurred in 1982 during my first commercial security project fixing the 30-line password algorithm of ACF2 (SKK, Inc.). Since then, I’ve only gone further down the rabbit hole of this critical area of information security.
Because ACF2 was the leading mainframe security product, and the primary product protecting US and other Western governments, we were heavily involved with trust certifications. These included C2 and B1 levels of assurance documented in the ‘Orange Book’ in the noted ‘Rainbow Series’ from the Department of Defense (DoD).
The ‘Green Book’ in the series dealt with password controls – this is where the commercial debate began in earnest. We at SKK, Inc. broke rank with our DoD counterparts and officially told our customers that the ‘Green Book’ controls were more dangerous than helpful for security.
For instance, implementers were told to store the last ten passwords of an account to determine if password reuse was occurring. At the time, we believed that sticky-note sales would skyrocket with such guidance – little did we know just how accurate that prediction was. Against our customers’ desires, we refused to budge on this issue and instead decided to act.
We opened our development doors inviting strong-authentication vendors to solve the problem. We introduced a new feature to ACF2/MVS 3.1.5 called Extended User Authentication Exit Facility, a.k.a. EUA Exit. The more notable companies we saw participate were Gordian Systems Inc., Enigma Logic and Security Dynamics. Today, these companies collectively represent the innovators behind many of the core one-time password (OTP) technologies you will read about in this book.
I personally tried my hand with a biometric startup in 1987 called ThumbScan. Our dream could not get out of the lab so we pivoted to ‘plan B’ and bought the failing Gordian OTP product and patents. ThumbScan/Gordian unfortunately failed as well, but years later I tried again under the Value Added Systems Company (VASCO) flag and finally got it right.
Ken Hunt, the CEO of VASCO, believed that security patents might be ‘important someday’, and I was still convinced the dreaded password was a scourge to computing. We set off in 1994 to change the world and this time we accomplished our goal by protecting banks across the globe – except for the US. We scratched our heads on that one for years.
Even as products were refined over the years, the industry barely noticed. Sure, some of us were successful but in the grand scheme of things the problems far outpaced solutions – things got worse, not better. Considering that, why are passwords so damning still today?
Foremost, the problem isn’t the idea of a password but rather that most passwords are created and managed by humans. A computer can generate and store a great password but humans will often create passwords that can be committed to memory. This leads to poor password selection and a high amount of reuse across systems.
Second, the number of accounts being created and maintained has exacerbated the aforementioned problems. We’re at a point where a social network for knitting could have its passwords stolen and criminals will drain bank accounts around the US.
Lastly, we have all underestimated pain thresholds – just how bad does it have to get? Our craziest fear-mongering marketers at VASCO couldn’t have written the headlines we see today. This last point, I’m afraid to say, is still with us, but a divide is happening where competitive advantages will separate winners and losers along trust lines.
The FIDO (Fast IDentity Online) Alliance – a not-for-profit consortium focused on open standards and interoperability around authentication security – has done a fantastic job in bringing many stakeholders to the table with the stated objective of killing passwords. Does anyone believe passwords will actually be ‘killed’? Of course they don’t. Can we bring far better solutions collectively to the industry than any one company? Absolutely.
The industry call to action is that application owners become activists. While no one entity can solve this, a class of entities can. It takes an activist, however, to start the ball rolling and two notable FIDO participants are PayPal and Google. When application owners realise that millions of