There has been a sharp increase in e-commerce and online banking transactions in recent times. Remote access to the office network has resulted in ease and convenience of work. Due to this, there is increase in online network access usage. The flip side of this is the attempt by parties interested in stealing vulnerable passwords and leading to potential security breaches.
Author: Rajesh Mago
Source: Hakin9 1/2009 http://hakin9.org
What you will learn…
What you should know…
The traditional way of accessing the network using username and the same static passwords no longer suffices. The need for automated and stricter authentication has led to the quest for offline and online authentication methods to allow secure access to physical and network resources. Hence, One Time Password (OTP) technology that generates and displays a unique password typically valid for a few seconds is increasingly in demand. OTP based authentication is a simple and secure way of verifying the user credentials and granting access to the resources. The generated OTP is unique per session and valid for a set time only, reducing the chances of a fraudster using it in real time. An OTP system generally requires the user to present two kinds of evidence to verify his/her identity. Therefore, it is also known as two-factor authentication. The required proofs are:
<div id=”headersubscriptionform”>Option for individual subscribers</div>
Please keep in mind that comments are moderated and
rel="nofollow" is in use. So, please do not use a spammy keyword or a domain as your name, or it will be deleted. Let us have a personal and meaningful conversation instead.
You must be logged in to post a comment.