Cyber Defense Magazine - Annual RSA Conference 2019 - Print Edition
Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition
Cyber Defense Magazine - Electronic Version - Annual RSA Conference 2019 - Print Edition
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Authentication Methods<br />
After the user is approved and<br />
given their account credentials,<br />
they need to authenticate<br />
themselves every time they log<br />
into their online accounts. In most<br />
cases, all that’s needed is a simple<br />
username and password. But,<br />
in some situations, businesses<br />
need higher levels of assurance<br />
to ensure that the person making<br />
the request is who they claim to<br />
be. These include:<br />
• Logging in from a foreign<br />
IP address<br />
• Password resets (in light<br />
of account takeovers)<br />
• Large money or wire<br />
transfers<br />
• Multiple unsuccessful<br />
logins<br />
• Requested change on<br />
authorized permissions<br />
• High-risk transactions<br />
(car rentals, hotel room keys)<br />
For these types of transactions,<br />
companies use a variety of<br />
authentication technologies<br />
including:<br />
• Knowledge-based<br />
authentication<br />
• Multi-factor<br />
authentication<br />
• Out of band<br />
authentication (e.g., SMSbased<br />
codes sent to the user’s<br />
smartphone)<br />
• Hardware and software<br />
tokens<br />
A New Paradigm for Identity<br />
Proofing and Authentication<br />
Unfortunately, there’s very<br />
little overlap between the<br />
technologies used for identity<br />
proofing and the technologies<br />
used for authentication. Making<br />
matters worse, many of these<br />
traditional forms of identity<br />
proofing and authentication have<br />
proven to be hackable, insecure<br />
and unreliable thanks to largescale<br />
data breaches, the dark<br />
web and man-in-the-middle<br />
exploits.<br />
This is both unfortunate and<br />
inefficient.<br />
62 <strong>Cyber</strong> <strong>Defense</strong> <strong>Magazine</strong> - <strong>Annual</strong> <strong>Print</strong> <strong>Edition</strong> <strong>2019</strong>