Internet Security – Authentication Methods

Jules PanopoulosBlog, Cybersecurity

Finjan Internet Security   Authentication Methods

As Finjan’s Director of Information Technology, I am looking forward to the 2016 year and adding layers of security for our internal resources and also being part of R&D team developing new security solutions. These are exciting times to be working in cyberspace! If information technology professionals haven’t realized it by now, they should, usernames and passwords are no longer considered secure enough as an access control solution. With each passing day IT departments are moving towards implementing “two factor” or “multi factor” authentication credentials to keep systems safe. At Finjan, I am tasked with the daily challenge of providing a more secure environment, reducing and/or mitigating risk.

What are the different authentication methods?

Single Factor Authentication

What most of us use when accessing websites and systems on the internet is commonly referred to as “single factor authentication”. Single factor authentication is access control that simply requires a username and password (what you know) to gain access.

Two Factor Authentication

Two factor authentication includes the “what you know” variable and then adds another “something you have” which can be a token or a pin sent as an SMS to a mobile device. The requirement of a second access credential adds the extra layer of security and reduces the risk of someone hacking a user’s account.

Multi Factor Authentication

The final access credentials solution “multi factor” authentication adds a third component “something you are” and requires the use of biometrics such as retinal scanning, fingerprints or voice recognition. This third factor is great deterrent to identity theft and hacking credentials. While an evil doer can steal your bank card or pin, stealing a fingerprint is much harder.

Today’s hackers can use sophisticated password cracking software and so even when we mandate the use of 10 plus character passwords it’s only a matter of time before brute force tactics can crack them. Two factor or multi factor authentication greatly reduces the risk of being compromised and here at Finjan we are developing technology solutions for systems and devices that will advance this even further. Some of the challenges IT departments will face are costs for adding authentication solutions to their systems while reconfiguring services for compatibility. However, the time and expense will be well worth it as their risk of systems being compromised will be greatly reduced.

Share this Post

Summary
Article Name
Internet Security - Authentication Methods
Description
Today’s hackers can use sophisticated password cracking software and so even when we mandate the use of 10 plus character passwords it’s only a matter of time before brute force tactics can crack them.
Author