And communications the republic of uzbekistan tashkent university of information technologies



Download 0,5 Mb.
Pdf ko'rish
bet7/24
Sana05.06.2022
Hajmi0,5 Mb.
#638263
1   2   3   4   5   6   7   8   9   10   ...   24
Bog'liq
14 Мавлонов Анвар

Two-factor authentication
(also known as 
2FA
or 
2-Step Verification
) is a 
method of confirming a user's claimed identity by utilizing a combination of two 
different components. These components may be something that the user knows, 
something that the user possesses or something that is inseparable from the user. A 
good example from everyday life is the withdrawing of money from a cash 
machine. Only the correct combination of a bank card  (something that the user 
possesses) and a PIN (personal identification number, something that the user 
knows) allows the transaction to be carried out. 2FA is ineffective against modern 
threats, like ATM skimming, phishing, and malware etc. Two-factor authentication 
is a type of multi-factor authentication. he use of two-factor authentication to prove 
one's identity is based on the premise that an unauthorized actor is unlikely to be 
able to supply both factors required for access. If, in an authentication attempt, at 
least one of the components is missing or supplied incorrectly, the user's identity is 
not established with sufficient certainty and access to the asset (e.g., a building, or 


data) being protected by two-factor authentication then remains blocked. The 
authentication factors of a two-factor authentication scheme may include: 
The major drawback of authentication performed using something that the 
user possesses and one other factor is that the plastic token used (the USB stick, 
the bank card, the key or similar) must be carried around by the user at all times. 
And if this is stolen or lost, or if the user simply does not have it with him or her, 
access is impossible. There are also costs involved in procuring and subsequently 
replacing tokens of this kind. In addition, there are inherent conflicts and 
unavoidable trade-offs between usability and security. 
Mobile phone two-factor authentication was developed to provide an 
alternative method that would avoid such issues. This approach uses mobile 
devices such as mobile phones and smartphones to serve as "something that the 
user possesses". If users want to authenticate themselves, they can use their 
personal access license (i.e. something that only the individual user knows) plus a 
one-time-valid, dynamic passcode consisting of digits. The code can be sent to 
their mobile device by SMS or via a special app. The advantage of this method is 
that there is no need for an additional, dedicated token, as users tend to carry their 
mobile devices around at all times anyway. Some professional two-factor 
authentication solutions also ensure that there is always a valid passcode available 
for users. If the user has already used a sequence of digits (passcode), this is 
automatically deleted and the system sends a new code to the mobile device. And 
if the new code is not entered within a specified time limit, the system 
automatically replaces it. This ensures that no old, already used codes are left on 
mobile devices. For added security, it is possible to specify how many incorrect 
entries are permitted before the system blocks access.
Security of the mobile-delivered security tokens fully depends on the mobile 
operator's operational security and can be easily breached by wiretapping or SIM-
cloning by national security agencies.
Advantages of mobile phone two-factor authentication 



No additional tokens are necessary because it uses mobile devices that 
are (usually) carried all the time. 

As they are constantly changed, dynamically generated passcodes are 
safer to use than fixed (static) log-in information. 

Depending on the solution, passcodes that have been used are 
automatically replaced in order to ensure that a valid code is always available; 
acute transmission/reception problems do not therefore prevent logins. 

The option to specify a maximum permitted number of incorrect 
entries reduces the risk of attacks by unauthorized persons. 

It is easy to configure; user friendly.
 
Disadvantages of mobile phone two-factor authentication 

The mobile phone must be carried by the user, charged, and kept in 
range of a cellular network whenever authentication might be necessary. If the 
phone is unable to display messages, access is often impossible without backup 
plans. 

The user must share their personal mobile number with the provider, 
reducing personal privacy and potentially allowing spam. 

Text messages to mobile phones using SMS are insecure and can be 
intercepted. The token can thus be stolen and used by third parties.

Text messages may not be delivered instantly, adding additional 
delays to the authentication process. 

Account recovery typically bypasses mobile phone two-factor 
authentication.

Modern smart phones are used both for browsing email and for 
receiving SMS. Email is usually always logged in. So if the phone is lost or stolen, 
all accounts for which the email is the key can be hacked as the phone can receive 
the second factor. So smart phones combine the two factors into one factor. 

Mobile phones can be stolen, potentially allowing the thief to gain 
access into the user's accounts.[2]


Advances in Mobile Two-Factor Authentication 
Advances in research of two-factor authentication for mobile devices 
consider different methods in which a second factor can be implemented while not 
posing a hindrance to the user. With the continued use and improvements in the 
accuracy of mobile hardware such as GPS, microphone, and gyro/acceleromoter, 
the ability to use them as a second factor of authentication is becoming more 
trustworthy. For example, by recording the ambient noise of the user’s location 
from a mobile device and comparing it the recording of the ambient noise from the 
computer in the same room on which the user is trying to authenticate, one is able 
to have an effective second factor of authentication. This also reduces the amount 
of time and effort needed to complete the process


Download 0,5 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10   ...   24




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish