31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Token-based authentication offers another layer of security beyond password and other single-factor<br />

authentication methods; giving only administrative users control over the actions needed <strong>for</strong> verification.<br />

As hackers have grown to realize, passwords are often repeated or slightly changed across accounts<br />

over time, making them easily accessible and, in some cases, putting multiple accounts at risk.<br />

Adding token-based authentication is an important step in preventing fraud as it ensures that any user<br />

must have access to an external account or device that will verify their identity through a uniquelygenerated,<br />

cryptographically- signed token or code. While this is a smart route to bolster security, this<br />

approach can be further strengthened to enable passwordless access through the use of biometric<br />

authentication.<br />

New technology has enabled fraudsters to reroute text messages and easily gain access to a person’s<br />

sensitive in<strong>for</strong>mation via an account takeover or by remotely accessing their IoT devices. Biometric<br />

authentication includes facial, fingerprint, iris, and voice biometric data that can be used to prove<br />

someone’s identity.<br />

For example, a person’s face is instantly compared to and matched with a database of existing users to<br />

prevent one user from making multiple accounts. Today, behavioral biometric technology is being used<br />

to detect behaviors like keystrokes or touchscreen behavior to continuously authenticate a user, leading<br />

to even stronger authentication.<br />

Un<strong>for</strong>tunately, today’s fraudsters have the benefit of new technologies like generative AI that make it<br />

much easier to spoof someone’s biometric in<strong>for</strong>mation. To effectively deter fraud, organizations need to<br />

implement solutions with biometric algorithms that aren’t vulnerable to generative AI and injection attacks,<br />

in addition to moving away from KBA and SMS authentication methods, which are becoming easier and<br />

easier <strong>for</strong> bad actors to break through in our increasingly digital world.<br />

Next-generation authentication like this provides a winning balance between security and convenience.<br />

Deploying future-<strong>for</strong>ward biometric and/or stateless authentication methods will ensure that the person<br />

attempting to access an account or per<strong>for</strong>m a transaction actually is who they say they are.<br />

Identity Verification Driven by AI and Machine Learning<br />

Current methods of identity fraud vary from creating fake IDs and passports to the use of more advanced,<br />

hard-to-spot deepfake technology. Even the technology available to cybercriminals is advanced enough<br />

to create replica ID cards that could fool the most experienced expert. A lot of solutions today only run<br />

around ten tests on an identity document, thus requiring manual review from humans, while top-of-theline<br />

solutions using machine learning are able to run hundreds of tests, which decreases user friction<br />

while increasing verification accuracy.<br />

Utilizing AI and ML is necessary <strong>for</strong> accurate and secure ID verification because people can’t learn all of<br />

the intricacies of identity documents. AI and ML offer a replacement <strong>for</strong> manual ID verification and can<br />

process data much faster than humans, resulting in the ability to quickly spot suspicious patterns, while<br />

also making sure visual aspects of the ID are in the right place. This would take much longer <strong>for</strong> a person<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 121<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!