Home » Downloads » Security

Security

Security

Security Key
Multifactor authentication has been growing in popularity. Now Google is adding support for a special USB device to provide a new twist to multifactor authentication for its users.
In information technology there are five broad categories of elements that can be presented to prove the genuineness or authenticity of a user. These authentication factors sometimes called authentication credentials, are where the user is, what he has, what he is, what he knows, and what he does. When more than one of these is used it is known as multifactor authentication. Many web sites that provide multifactor authentication typically require the user to enter a password (what he knows) and also enter a code that has been sent to the user’s cell phone (what he has) or generated from a mobile app on the phone.
On Tuesday (Oct 21 2014) Google announced that they will now support Security Key. This is a special USB device based on the Universal 2nd Factor (U2F) open protocol that was developed by the FIDO Alliance, which is a multivendor association that is developing alternative authentication credentials to reduce reliance on passwords. When a user enters their Google password they can also be prompted to insert into the USB drive of their computer the Security Key, providing authentication based on what he knows and what he has.
Although Security Key is a good idea there may be some limitations. First, FIDO U2F Security Key devices cannot also be used to store files as with a regular USB flash drive, so users may have to carry multiple USB devices. Also, many organizations disable USB ports on their computers since a large percentage of malware is distributed through infected USB flash drives.
You can read more about it at http://googleonlinesecurity.blogspot.ro/2014/10/strengthening-2-step-verification-with.html

 

 

 

 

……………………….Answer preview………………………….

Introduction
This essay aims at exploring the two factor authentication by first defining what the security key is and how it is implemented in real life situations. It is important for people to know how the technology works and how it can be useful to them in securing their data or information, which is what the essay discusses………………

APA

401  words

Accounting

Applied Sciences

Article Writing

Astronomy

Biology

Business

Calculus

Chemistry

Communications

Computer Science

Counselling

Criminology

Economics

Education

Engineering

English

Environmental

Ethics

Film

Food and Nutrition

Geography

Healthcare

History and Government

Human Resource Managment

Information Systems

Law

Literature

Management

Marketing

Mathematics

Nursing

Philospphy

Physics

Political Science

Psychology

Religion

Sociology

Statistics

Writing

Terms of service

Contact