{"id":6665,"date":"2013-01-09T08:35:24","date_gmt":"2013-01-09T13:35:24","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=6665"},"modified":"2013-01-09T13:44:52","modified_gmt":"2013-01-09T18:44:52","slug":"passwords-enough-alternatives","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2013\/01\/passwords-enough-alternatives\/","title":{"rendered":"When passwords are not enough: alternatives to consider"},"content":{"rendered":"
Three alternatives to passwords, which can be\u00a0used to increase the security of\u00a0critical resources, are examined..<\/em><\/p>\n In a number of\u00a0our earlier\u00a0posts, particularly those dealing with privacy and security, we do remind everyone set strong passwords \u2013 see for example, How secure are your passwords?<\/i><\/b><\/a>\u00a0\u00a0However, due to considerable\u00a0processing power and software programmes that is readily available for those that might want to breach our security, industry experts have acknowledged that regardless of our best efforts generate and manage strong passwords, they can still be cracked relatively easily. This post highlights options that could be considered when passwords and passcodes\u00a0should not be the sole security control mechanism for crucial physical and electronic resources upon which we rely.<\/p>\n Biometric authentication has been around for several years and is based\u00a0on using human characteristics or traits to confirm a person\u2019s identification. Many of us are familiar with biometrics through movies, which frequently\u00a0show irises, retinas and fingerprints being are scanned, or even when travelling to countries such as to the United States, where facial recognition and fingerprinting are used\u00a0at Immigration\/Border Control. However, a number of mass market computing devices, such as laptops and smartphones, either have built-in biometric capabilities, or there are hardware\u00a0or software options through which it can be implemented, as highlighted below:<\/p>\n Unlike passwords that typically are between six and 14 characters, a passphrase\u00a0consists of a series of words or text that are used\u00a0for security control purposes. One of the key benefits of passphrases\u00a0over passwords is that the considerable\u00a0longer length of the code allows for increased complexity, which at the very least, can make successful breach more difficult. \u00a0However, in order to\u00a0be a marked improvement over passwords, at a minimum, passphrases ought to be:<\/p>\n It also is important to highlight that similar to\u00a0passwords, passphrases\u00a0should easy to remember, and should not be reused between websites, applications, etc.<\/p>\n Security or authentication tokens are used\u00a0to confirm a person\u2019s identity, and can be\u00a0used to replace passwords or to add an extra level of the security to an existing system. These tokens can take many forms, such as hardware-based, as a smart card or USB dongle, or electronically generated, and transmitted (with wireless encryption) to mobile or portable devices. Additionally, regarding electronic tokens, in particular, there is the potential to generate new security keys as and when necessary, e.g. for each new transaction, which again reduces the likelihood of successful intrusion.<\/p>\n Authentication tokens are widely used by the banking industry to supplement the customer password. A few banks in the Caribbean have already introduced this level of security, but this is still the exception, rather than the norm. The video clip below describes how the security token for Citi\u00a0works, where customers are provided with a physical device that generates the tokens needed to complete their online transactions.<\/p>\nBiometric authentication<\/h3>\n
\n
Passphrases<\/h3>\n
\n
Authentication tokens<\/h3>\n