z-logo
open-access-imgOpen Access
Multifactor Authentication
Author(s) -
Ionuț-Daniel BARBU,
Gabriel Petrică
Publication year - 2014
Publication title -
proceedings of international conference on cybersecurity and cybercrime
Language(s) - English
Resource type - Conference proceedings
eISSN - 2393-0837
pISSN - 2393-0772
DOI - 10.19107/cybercon.2014.01
Subject(s) - password , computer science , computer security , authentication (law) , cloud computing , multi factor authentication , the internet , authentication protocol , world wide web , operating system
With the advent of Internet of Things, large number of devices became connected to the cloud via various services. From an Information Security perspective, this aspect adds additional tasks to the defense in depth layers. This article tackles the authentication level and its options. This topic has been chosen, as user/password authentication is obsolete and no longer secure. Despite the increased complexity of the passwords, the use of rainbow tables and the large processing power available, the systems are vulnerable to brute force attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here