02.03.2019 Views

Cyber Defense Magazine - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Authentication Methods<br />

After the user is approved and<br />

given their account credentials,<br />

they need to authenticate<br />

themselves every time they log<br />

into their online accounts. In most<br />

cases, all that’s needed is a simple<br />

username and password. But,<br />

in some situations, businesses<br />

need higher levels of assurance<br />

to ensure that the person making<br />

the request is who they claim to<br />

be. These include:<br />

• Logging in from a foreign<br />

IP address<br />

• Password resets (in light<br />

of account takeovers)<br />

• Large money or wire<br />

transfers<br />

• Multiple unsuccessful<br />

logins<br />

• Requested change on<br />

authorized permissions<br />

• High-risk transactions<br />

(car rentals, hotel room keys)<br />

For these types of transactions,<br />

companies use a variety of<br />

authentication technologies<br />

including:<br />

• Knowledge-based<br />

authentication<br />

• Multi-factor<br />

authentication<br />

• Out of band<br />

authentication (e.g., SMSbased<br />

codes sent to the user’s<br />

smartphone)<br />

• Hardware and software<br />

tokens<br />

A New Paradigm for Identity<br />

Proofing and Authentication<br />

Unfortunately, there’s very<br />

little overlap between the<br />

technologies used for identity<br />

proofing and the technologies<br />

used for authentication. Making<br />

matters worse, many of these<br />

traditional forms of identity<br />

proofing and authentication have<br />

proven to be hackable, insecure<br />

and unreliable thanks to largescale<br />

data breaches, the dark<br />

web and man-in-the-middle<br />

exploits.<br />

This is both unfortunate and<br />

inefficient.<br />

62 <strong>Cyber</strong> <strong>Defense</strong> <strong>Magazine</strong> - <strong>Annual</strong> <strong>Print</strong> <strong>Edition</strong> <strong>2019</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!