Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Mobile
    • Networking

    How to Thwart Network Attacks with Two-Factor Authentication

    Written by

    Steve Dispensa
    Published February 24, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A user keys in his password to log onto the network and his cell phone rings. If the user answers and keys in his PIN number, he is allowed access. If he doesn’t, then entry to the network is denied, IT is alerted and the attack is thwarted. In order for a hacker to access the user’s account, he must know the user’s password, have physical possession of the user’s phone and know the user’s PIN. Not likely.

      The combination of multiple authentication methods with the use of the telephone network makes this type of log-in virtually impossible to compromise. And it’s becoming the new standard. Two-factor authentication is not just a best practice anymore. For many industries, particularly those impacted by the Health Insurance Portability and Accountability Act (HIPAA) or by Payment Card Industry (PCI) and Federal Financial Institutions Examination Council (FFIEC) regulations, two-factor authentication is a requirement. With data and identity theft at record levels, the threat to companies and individuals is significant. The risks are high, and no one wants to be at the helm when such an attack takes place.

      And there’s no need. Many of the challenges presented by traditional two-factor solutions, such as security tokens, are easily overcome by the introduction of phone-based authentication. Tokens are known for being particularly painful for users and costly for companies to support. Phone-based authentication is easy to set up and even easier to use. Not only that, it’s simply better security.

      Phone-based authentication makes sense in a variety of circumstances, but there are a couple of cases where it is particularly good: large-scale deployments (where it would be impossible to deploy devices to every user and installing software or certificates would result in an array of support issues), and with any application where you can’t-or don’t want to- modify the user interface. Another shining case for phone authentication is with securing online banking transactions.

      Two-factor authentication in online banking

      Consider an online banking session, for example. After a user has logged in, it’s hard for a bank to say whether the user is doing the typing or some malware. With phone-based authentication, the user can authenticate specific transactions during an online banking session. If a wire transfer or some other high-risk transaction is initiated, the user gets a call asking to confirm the transfer. Details of the transaction are included in the call, so there’s no question about which transaction the user is confirming.

      There are a number of so-called “man-in-the-middle” attacks that can result in an attacker hijacking an otherwise valid session. With traditional two-factor authentication, the attacker can simply wait for the user to authenticate and then hijack the authenticated session. This is particularly common these days in a scenario called the “man-in-the-browser” attack, in which the user’s Web browser is subverted by malware.

      Phone-based authentication makes it impossible for a bad guy to trick a server into doing something the user didn’t intend. The user will instantly get a phone call and can deny the action. Because phone-based authentication can be applied to any type of transaction, not just online transactions or log-ins, it can be used to authenticate physical access to a restricted facility or even to confirm retail transactions.

      An interesting case is credit card purchases. Say you’re trying to make a legitimate credit card purchase, but for some reason the transaction is flagged as high-risk (perhaps you’re in another city and shopping late at night). Often, the standard is that you’ll get rejected at the cash register or online. That transaction could easily be authenticated with an automated phone call, allowing legitimate transactions to be verified and go through-even if an alert is triggered. Not only is the purchase allowed to go through, but if it had been fraudulent, the transaction would have been blocked in real time rather than flagged for review after the fact. The icing on the cake is usability. Since everyone has access to a phone, deployment is a non-issue.

      Easy Enterprise Installation

      Easy enterprise installation

      For enterprise deployments, you simply download and install the authentication software on your existing hardware. For an Outlook Web Access (OWA) implementation, for example, you simply install the software on the server where OWA resides. Then add users, either manually or by importing them from Active Directory (AD) or LDAP. Welcome e-mails will be automatically sent to users, and all future log-ins will be secured by a phone call.

      The setup process is the same for virtually any VPN, Citrix Web interface, Internet Information Services (IIS) Web site, Terminal Services or RADIUS application. No programming is required; it’s all off-the-shelf. Even in complex environments, the implementation is straightforward.

      For example, we have a call center client with a massive Citrix farm. We were able to integrate all of the necessary touch points without requiring any material changes to their network infrastructure (no new hardware was required, we leveraged their existing directory, the log-in interface stayed the same and so on). And, because there were no devices to provision to users or software/certificates to install to their computers, the call center was able to rapidly enable phone authentication for thousands of their home-based agents.

      For Web sites or online transactions, Web plug-ins make it easy for a developer to integrate into an existing Web site. Enrolling users is simple and only requires that they enter the phone number to use when authenticating.

      Ongoing user support is minimal. People rarely lose their cell phones, and if they do, they replace them quickly. I couldn’t make it a day without my iPhone, and I’m pretty sure I’m not alone. A backup phone number can be used, or users can also call IT to temporarily change to an alternate phone number, if necessary.

      As we move further away from relying on passwords alone to protect access to mission-critical systems and sensitive data, more people are moving toward phone-based authentication because of the ease of use and added security offered by leveraging the telephone network. We’re seeing it deployed in a growing number of enterprises as well as consumer applications such as online banking. It’s possible that this sort of security will become as common as cell phones themselves. You won’t remember what you did before you had it.

      /images/stories/heads/knowledge_center/dispensa_steve70x70.jpg Steve Dispensa is co-Founder and Chief Technology Officer of PhoneFactor. Steve is a leader in the field of data security and device driver development technology, holding numerous patents in the fields of computer science and telecommunications. Steve also hosts Security Break Live, an Internet radio talk show, as well as a blog of the same name. He can also be reached at dispensa@phonefactor.com.

      Steve Dispensa
      Steve Dispensa
      Steve Dispensa is co-founder and Chief Technology Officer of PhoneFactor. Steve is a leader in the field of data security and device driver development technology, holding numerous patents in the fields of computer science and telecommunications. Steve also hosts Security Break Live, an Internet radio talk show, as well as a blog of the same name. Visit it at securitybreaklive.com. He can also be reached at dispensa@phonefactor.com.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×