Explore chapters and articles related to this topic
IoT Security Frameworks and Countermeasures
Published in Stavros Shiaeles, Nicholas Kolokotronis, Internet of Things, Threats, Landscape, and Countermeasures, 2021
G. Bendiab, B. Saridou, L. Barlow, N. Savage, S. Shiaeles
Passwords management is one of the most common in any information awareness program. Commonly used and simple passwords can be easily guessed by cybercriminals and give them access to a large range of accounts. A study16 found that 59% of end-users use the same password for every account. According to security reports, stolen or weak passwords are still the most common reason for data breaches [63]; thus, end-users should be aware of the security risks related to password theft. With security awareness training, end-users will learn how to create strong, secure passwords, and then store and utilize them properly. Also, using two-factor authentication will provide extra layers of security to protect the integrity of their accounts.
Design of a Secure Infrastructure for Cognitive IoT Platforms and Applications
Published in Pethuru Raj, Anupama C. Raman, Harihara Subramanian, Cognitive Internet of Things, 2022
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
A multi-factor authentication uses one or a combination of all the parameters mentioned above in order to verify a user’s credentials. In some cases, only two factors mentioned above may be used for authentication, then it is called a two-factor authentication.
Development of an automated system model of information protection in the cross-border exchange
Published in Cogent Engineering, 2020
Begimbayeva Yenlik, Ussatova Оlga, Biyashev Rustem, Nyssanbayeva Saule
Important in ensuring information security in the automated management system is ensuring the availability and integrity of configuration management information and personal data information. Increased attention has been paid to the prevention of unauthorized access to the system to maintain its stable functioning. However, due to the constantly increasing number of different services and various attacks on user accounts, there is a need to use two-factor authentication methods to ensure information security. In the past decade, these methods have been widely used in various areas of information and communication technologies. They are related to issues of identification and access of a subject to confidential information. They are trusted by a large number of companies, including high-tech organizations, financial and insurance sectors of the market, large banking institutions and public sector enterprises, independent expert organizations, as well as research firms. Consider the algorithm of two-factor authentication based on the authentication program and a mobile application for secure user identification.
Artificial Intelligence and Cyber Defense System for Banking Industry: A Qualitative Study of AI Applications and Challenges
Published in Cybernetics and Systems, 2022
Khalifa AL-Dosari, Noora Fetais, Murat Kucukvar
Chat bots may create privacy risks and result in data leakage. The respondents reported that Qatar banks use traditional methods, such as SSL encryption and two-factor authentication, to combat this threat. SSL ensures that the information exchanged through the connection is private. Two-factor authentication requires the user to verify their identity by retrieving a code sent to another device.