TITLE

Towards an Extra Layer of Security: The Cost of Two-Factor Authentication

AUTHOR(S)
Hari Om Prakash
PUB. DATE
March 2015
SOURCE
Electronics For You;Mar2015, Vol. 3 Issue 11, p72
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the advantages of two-factor authentication (TFA) including the reduction of incidence of online identify theft, phishing expeditions and other online frauds, and increases the level of security. Disadvantages of TFA include the increase inconvenience to the user when increasing the level of security, possibility of hacking physical component and its reliance on physical hardware devices. A chart is also presented that lists several tokens/services available in the market.
ACCESSION #
109174689

 

Related Articles

  • Authentication. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Jan2014, Vol. 25 Issue 1, p36 

    This article discusses the review by Labs staff of "SC Magazine" as well as outside experts of several authentication tools being offered by vendors, including ActivID, Entrust, and SecureAuth IdP. Topics discussed include why security professionals view password authentication as worthless, and...

  • IRS committed to working with taxpayers who are the victims of identity theft.  // Jackson Advocate;2/9/2012, Vol. 74 Issue 17, p7B 

    The article reports on the efforts of U.S. Internal Revenue Service (IRS) in preventing online identity theft and fraud incidents.

  • Multi-Factor Authentication Market worth $10.75 Billion by 2020.  // Sensors;4/4/2014, p1 

    The article reports that the total multi-factor authentication market is expected to reach 10.75 billion U.S. dollars by 2020, according to the market research report "Multi-Factor Authentication Market by Model/Type (Two, Three, Four & Five-Factor), Application (Banking & Finance, Government,...

  • In The Crosshairs. BATTERSBY, MARK E. // SHOT Business;Aug/Sep2015, Vol. 23 Issue 5, p40 

    The article focuses on how businesses can prevent data breach. Topics discussed include several cybercrimes, which include online identity theft, hacking, and phishing, one in three small businesses which are cybercrime victims based on the National Cyber Security Alliance, nonprofit cyber...

  • IRS, Security Summit partners Remind Taxpayers to Recognize Phishing Scams.  // Employee Plans News;2016, Issue 13, p1 

    The article offers information on the reminder made by the U.S. Internal Revenue Service (IRS), its Security Summer partners for taxpayers to prevent identity theft and to recognize phishing scams through emails. It states that the agency, states and the tax community are sharing information to...

  • IRS, Security Summit Partners, Remind Taxpayers to Protect Themselves online.  // Employee Plans News;2016, Issue 13, p1 

    The article offers information on the reminder made by the U.S. Internal Revenue Service (IRS), the states and the tax industry for taxpayers to protect themselves online and to help fight against identity theft. It discusses some of the best practices that need to follow by taxpayers to protect...

  • Protect Your Clients: Security Summit Partners Warn Tax Pros of Cybercriminals, Launch New Awareness Tips.  // Employee Plans News;2016, Issue 13, p1 

    The article offers information on the Protect Your Clients: Protect Yourself campaign launched by the Security Summit partners, a collaborative effort among the U.S. Internal Revenue Service (IRS), state tax agencies, and the tax community. It discusses various alerts warning for breaching...

  • Going Corporate. Kuehner-Hebert, Katie // Independent Banker;Jan2014, Vol. 64 Issue 1, p12 

    The article focuses on the use of mobile devices as marketing tool of retail banking industry in the U.S. It says that the industry is deploying mobile channels as its mobile market differentiator. It notes the corporate mobile banking application offered by those considered the largest 50 banks...

  • Protecting Your Online World With Two-Factor Authentication. Mighell, Tom // Law Practice: The Business of Practicing Law;Mar/Apr2015, Vol. 41 Issue 2, p32 

    The article reports on the significance of two-factor authentication to gain access to an online account as a security measure. It refers to wired journalist Mat Honan whose Web-based email service Gmail and social media platform Twitter accounts were hacked back in 2012. Two-factor...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics