Mitigating Vulnerabilities in 3-Factor based Authentication
نویسندگان
چکیده
منابع مشابه
Mind your SMSes: Mitigating social engineering in second factor authentication
SMS-based second factor authentication is a cornerstone for many service providers, ranging from email service providers and social networks to financial institutions and online marketplaces. Attackers are not slow to capitalize on the vulnerabilities of this mechanism, using social engineering techniques to coerce users to forward authentication codes. We demonstrate one social engineering att...
متن کاملMitigating and Monitoring Program Security Vulnerabilities
Today's programs are implemented in a variety of languages and contain serious vulnerabilities which can be exploited to cause security breaches. These vulnerabilities have been exploited in real life and resulted in damages to related stakeholders such as program users. As most vulnerabilities belong to program code, many techniques have been applied to mitigate vulnerabilities before and afte...
متن کاملMitigating Phishing with ID-based Online/Offline Authentication
Enforcing strong authentication is an option to mitigate phishing. However, existing authentication methods, like traditional digital signatures, require unrealistic full deployment of public key infrastructure(PKI) and destroy email users’ privacy in that the identity of an email sender is automatically revealed to the public. There have been some works in the literature, where the technology ...
متن کاملMitigating Intrusion and Vulnerabilities in Cognitive Radio Networks
The deployment of Cognitive Radio Networks has been greatly hindered in spite of its potentials by the rate at which intrusions and vulnerabilities replicate within every domain of the network. Cognitive Radio Network is expected to drive the next generation wireless networks that can optimize the use of spectrum due to its unique and dynamic properties, but the high rate of intrusions has frus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/13283-0678