Multifactor Authentication
Downloads
With the advent of Internet of Things, large number of devices became connected to the cloud via various services. From an Information Security perspective, this aspect adds additional tasks to the defense in depth layers. This article tackles the authentication level and its options. This topic has been chosen, as user/password authentication is obsolete and no longer secure. Despite the increased complexity of the passwords, the use of rainbow tables and the large processing power available, the systems are vulnerable to brute force attacks.
Downloads
https://en.wikipedia.org/wiki/Multi-factor_authentication
"Information technology -- Identification cards -- Financial transaction cards". ISO/IEC 7813:2006.
van Tilborg, Henk C.A.; Jajodia, Sushil, eds. (2011).Encyclopedia of Cryptography and Security, Volume 1. Springer Science & Business Media. p. 1305. ISBN 9781441959058.
"SANS Institute, Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches".
"SANS Institute, Critical Control 12: Controlled Use of Administrative Privileges".
http://thedigitalteacher.ca/wp-content/uploads/2014/06/Screen-Shot-2013-02-07-at-12.14.39-PM.png
http://www.smspasscode.com/media/1235/adaptive_figure_01.png