blog




  • Essay / The Use of Internet in Electronic Authentication

    Table of ContentsIntroductionBackground of the StudyProblem StatementAuthenticationElectronic AuthenticationOne-Time Password (OTP)Quick Response (QR) CodeA QR CodeLiterature ReviewFor decades, Humans have used password-based systems as the primary modes of authentication on websites and other electronic platforms. The password authentication system primarily prevents unauthorized access. However, the numerous cases of thefts and hacks have exposed the various security weaknesses of these systems, which has forced improvements that include the use of entities such as ownership, knowledge and heredity as main factors that are combined with secondary factors such as mobile phones to ensure improvement. security guarantees. Many daily activities and services such as banking have radically transformed into Internet services. Moving sensitive data services to the Internet requires strong authentication to ensure adequate security and privacy. Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”? Get the original essay The ubiquitous nature of computing today means that most people rely on public computers and electronic devices to conduct their businesses online, making it a preferred area for many electronic users. services such as electronic banking and e-commerce, making security an important factor. To ensure optimal security and privacy, electronic authentication based on quick response code and one-time passwords makes life more difficult for potential intruders who wish to access restricted resources. As a result, various QR and OTP systems have been designed using time-synchronized SMS, smart cards and tokens. The increase in bolder attacks from hackers and cybercriminals makes security risks more pressing. As a result, systems based on single factors such as password authentication become prone to vulnerabilities, forcing the use of electronic authentication using multiple factors. This research paper analyzes electronic authentication systems that use QR code and OTP and finds that these systems are very secure and can be used for many types of services such as banking transactions.IntroductionToday, attempts to to secure the entire online service system continue to progress in development. of the many people who try to take advantage of it by illegally accessing certain systems. Despite numerous efforts and measures to ensure security, there are still unnoticed flaws in the system. Different eras come with different changes to authentication systems, ranging from textual to graphical passwords. These measures have proven ineffective at ensuring security and privacy, as everyday attackers design and find new avenues and routes to exploit. Today, there are a large number of Internet users, a number that continues to increase over time. As a result, people can now use different online services offered by hospitals, online shopping sites, banks, universities and bill payment. Access to these and other online services requires a text-based authentication system. Although the systemWhile text-based authentication proves functional, it has some flaws affecting its usability and security issues, negating identity, the cornerstone of electronic trust. The electronic authentication approach aims to block potential imposters while being more reliable. to the user. The main function of a security system is to control the movement of people entering and exiting certain areas such as information systems, national borders as well as physical buildings among others. Elsewhere, psychology studies teach that the brain recognizes and remembers a physical image rather than text. This means that computers and electronic security systems must consider human factors such as accessibility and ease of use. In fact, the main flaws of the electronic authentication system lie in the fact that the systems do not take into account the importance of human factors when it comes to security. As such, an ideal security system should prioritize usability, security and human factors in order to increase the number of well-trained and competent users to include other broader parameters. Background of StudyValidation services deal with authentication and authorization, which means their main purpose, deals with security and the issues arising from it. Therefore, it is important that electronic authentication services remain consistent, stay up to date with the latest technologies and at the same time have minimal risk of security breaches. Security and delay aspects are therefore an absolute priority when designing electronic authentication services. For example, electronic banking applications inform customers of the status of their accounts and provide them with the ability to confirm their balance and make transfers from their accounts. This makes account security a major factor when agreeing to use apps. Although time is an important factor, most users may not give it much importance if the security of the transaction is ensured so that other parties cannot access the account information and cannot therefore not initiate further transfers. Authentication platforms such as Secure Login and Communications use cryptographic algorithms to ensure private client-server relationships, ensure that transactions are never repudiated, and ensure that data communicated between them is not only complete but also valid (Liao & Lee, 2010). ProblemValidation services work by comparing two values. A user provides the input value and the system compares it to the previously entered value (Gemalto, nd). A direct match between input and stored values ​​provides access to resources such as bank accounts, websites, or job sites. Therefore, designers of these systems must carefully consider the objectives of the system. For example, for banking transactions, security comes first, meaning that the authentication process must involve certain validation checks before access and transactions are authorized. The seriousness of financial transactions makes time a secondary factor, which users readily accept. However, there are certain situations where time is more critical and therefore require a fast and secure electronic authentication system. Authentication Using the Internet for electronic authentication has many advantages such as speed andthe user interface. Despite these advantages, the use of the Internet for authentication creates vulnerabilities to cybercriminals, unprincipled threats and hackers that result in repudiation, unauthorized access and manipulation of stored content as well as non-privileged activities (Kennedy, 2010). It is therefore very important to design and implement robust solutions that authenticate identities before a user can access certain services and resources. To prove a user's identity, the three factors used include ownership, knowledge, and inference. The user must provide their evidence such as a fingerprint, card or password to support each factor (Kennedy, 2010). A common situation today is the importance of authentication when accessing certain buildings. Physical location authentication is based on older methods such as security guards checking the validity of a person as an entity against a defined list of names of people with access to the facility . Due to its manual nature, the process tends to be time consuming. Other electronic authentication systems employ the use of video or voice sessions between recipients and arrivals, thus providing the visitor with a means to authenticate from where the recipient decides to grant or deny access. access to the building. Obviously, this and other authentication systems mentioned take more time. However, current technological advances make it possible to use certain devices to design new, faster and more secure means of electronic authentication when accessing buildings and other complex electronic services such as accounts. websites and online banking services. These authentication systems must be easy to implement while ensuring maximum security. Using existing devices and software to design QRs and OTPs into electronic authentication instances is proven to be cost-effective and more secure than other means such as graphical passwords. The use of QR and OTP during electronic authentication would clearly and directly differentiate between authorized and unauthorized users and at the same time allow a user to use multiple computers and mobile devices. Electronic Authentication Electronic authentication involves establishing trust in user identities electronically. Also known as digital authentication, the process confirms or certifies the identity of a certain user (IT, 2009). The process provides users with a more secure way to verify a user's identity during transactions and other online activities, which is particularly useful given the current increase in cases of fraud and identity theft. Electronic authentication offers many options when authenticating a user's identity, such as passwords and multi-factor authentication. The model was developed by NIST and authenticates people and accounts regardless of jurisdiction or physical location. The authentication process begins with a user applying to a CSP. The identification service provider must prove the identity of the applicant in order for the applicant to receive “subscriber” status. The system then provides an authenticator such as an ID and tokens, which takes many forms such as a username. Credential Service Provider manages credentials and data..