Security
Security Security Key Multifactor authentication has been growing in popularity. Now Google is adding support for a special USB device to provide a new twist to multifactor authentication for its users. In information technology there are five broad categories of elements that can be presented to prove the genuineness or authenticity of a user. These authentication factors sometimes called authentication credentials, are where the user is, what he has, what he is, what he knows, and what he does. When more than one of these is used it is known as multifactor authentication. Many web sites that provide multifactor authentication typically require the user to enter a password (what he knows) and also enter a code that has been sent to the user?s cell phone (what he has) or generated from a mobile app on the phone. On Tuesday (Oct 21 2014) Google announced that they will now support Security Key. This is a special USB device based on the Universal 2nd Factor (U2F) open protocol that was developed by the FIDO Alliance, which is a multivendor association that is developing alternative authentication credentials to reduce reliance on passwords. When a user enters their Google password they can also be prompted to insert into the USB drive of their computer the Security Key, providing authentication based on what he knows and what he has. Although Security Key is a good idea there may be some limitations. First, FIDO U2F Security Key devices cannot also be used to store files as with a regular USB flash drive, so users may have to carry multiple USB devices. Also, many organizations disable USB ports on their computers since a large percentage of malware is distributed through infected USB flash drives. You can read more about it at http://googleonlinesecurity.blogspot.ro/2014/10/strengthening-2-step-verification-with.html ? ? ? ?Introduction This essay aims at exploring the two factor authentication by first defining what the security key is and how it is implemented in real life situations. It is important for people to know how the technology works and how it can be useful to them in securing their data or information, which is what the essay discusses APA 401 ?words Related Questions: Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret Write a summary for each article followed by an explanation of how they illustrate the selected threats and attacks Write a 5 page paper on the relationship between these parts of the Bill of Rights and the administration of justice and security Write a 3 page paper titled ?Hospital Information Systems Security Identify some common safety issues related to food purchase, storage, and preparation Information security
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
