...
...
Refined Knowledge Hub
Page Properties | ||
---|---|---|
|
...
...
DOC-XXX-XXXXX
...
...
Guidance
...
Responsibility for implementation & training:
...
Cyber Essentials Manager
...
...
No
...
...
Cyber Essentials
...
...
Initial version
...
...
...
...
Review and consultation process:
...
Reviewed Annually by Cyber Essentials Manager
...
...
Controlled in Confluence Quality Management System.
| ||||||
|
Page Properties | ||||||
---|---|---|---|---|---|---|
| ||||||
|
Download PDF
View file | ||
---|---|---|
|
Version 1
Published
Reviewed
...
|
The below will appear on the Refined page at https://iasme.atlassian.net/wiki/spaces/CEKH/pages/2660401698/About+2+factor+authentication#
Excerpt | ||
---|---|---|
| ||
Multi-factor authentication, or MFA as it’s commonly abbreviated to, adds an extra step to your basic log-in procedure for one of your online accounts. Without MFA, you enter in your username and password, and then you’re done. The password is your single factor of authentication. The extra factor makes your account more secure. Multi-factor authentication is any number of factors more than one. The three types are:
Why is multi-factor authentication important?Passwords have been the mainstream form of authentication since the earliest days of computing, however, if we consider that 90% of passwords can be cracked in less than six hours and two-thirds of people still use the same password everywhere, they may not be as secure as they need to be. What are the different ways to implement multi-factor authentication?The methods described below all involve ‘something you have’ methods of authentication. There is usually an enrolment process where the user logs onto a website or app with a username and password and follows a process to enable multi-factor authentication. Then for subsequent log ins, the process will ask for the extra layer of authentication. Time-based One-Time Password (TOTP)TOTP involves the generation of a one-time passcode from a shared secret key. This can be generated by a physical device that the user is given such as key fob, a USB dongle or smart card which dynamically generates a token for the user. The code is valid for only a short time, sometimes as low as 30 seconds and is single use. Short Message Service (SMS)Perhaps the most common method of implementing MFA. This method sends the user a unique token via SMS text message, normally a 5-10 digit code. The user then needs to provide this unique token before they are granted access. Push notificationsTypically, push notifications work with applications. A push notification is sent to the app on your mobile device. This notification is a login request and includes information such as the application name, the Operating System and internet browser you are using as well as the location and the date of the request. The user accepts the request & automatically the user becomes logged in. Biometric authenticationBiometrics or ‘something you are’ authentication is considered the most secure and hardest to compromise form of MFA. It’s also more convenient, as users are the token, so the login process is quick and easy and they are not required to have their mobile device on them at all times. Physical identifiers can be fingerprints, facial features, iris or retina patterns or voice. Behavioural identifiers can be hand-writing analysis or typing patterns. Can MFA be breached?While multi-factor authentication does improve security, no security system is 100% safe. How to enable multi-factor authentication.Most of your common accounts such as Google, Microsoft, Yahoo, Facebook, LinkedIn, Twitter and Instagram have MFA available for your log in. Simply enable it. Go to the security page in settings, click multi-factor authentication and then the get started button to sign in to your account and turn on MFA. Backup optionIf you are currently receiving MFA codes via SMS, it is recommended that you set up at least one backup option in case you can’t access your phone. You can print out a handful of backup codes that you’ll then store in a safe place. You can also use Google Authenticator app as a backup option or USB security key. |