Tag Archives: information
How Can an Out of Band One Time Password Secure Information
Usually during the two-factor authentication process a one-time password is used to verify the users identity. This secures authentication by asking for multiple criteria to be met such as something you know and something you have. Something you know being your traditional username and password and something you have being your OTP or one-time password. However during transmission of this one-time password a hacker could still intercept the data to gain access if the OTP is not sent to an out-of-band network.
One-time passwords come in many forms from something as simple as a sheet of codes to the more advanced propriety key generating tokens. Many times for information that is not an extremely high security risk the OTP will be sent via email to the user for identification. This is not an out-of-band solution because the email can be received on the same network as the login panel.
The problem with sending the second factor in the authentication process to a solution that is not out-of-band is that easy to use and readily available software makes it easy to intercept information including the users one-time password. With an out-of-band solution the user would need to receive their OTP on a separate network than their login panel. One way is through proprietary tokens that generate dynamic one-time passwords. However tokens be pricey and can create havoc when lost or misplaced.
Another less expensive and more reliable device would be the users mobile phone. Since we are a society who must be connected to our mobile phones constantly a user will not forget their device and the chances of the device being broken are much lower. Also the devices network is completely out-of-band from any login panel.
Securing authentication by sending the one-time password through an out-of-band network protects the user from malicious software as well as misplacement of their device. This makes it very hard for a novice hacker to gain access to confidential information or networks and ensures the user will receive their OTP when they need it.
The only way to become more secure once you already utilize an out-of-band OTP for two-factor authentication is if it is a zero footprint solution. Zero footprint authentications allow the one-time password to be sent without leaving any trace of the authentication or password behind on the device. Ultimately securing the authentication process completely from internet or network based attacks.
Safe Computing Advice
Keep your computer updated at all times and dont forget third party applications such as Adobe, Flash, and Java. Some of the third party applications dont get updated automatically.
Its important to log out of your account when using public computers, by not doing so, you are putting yourself at risk because other people will be able to view and access you account.
Imagine a situation, Jack is a student and a frequent online shopper. He uses his credit card information to purchase something online but he forgets to log out when he leaves. Here comes Steve and Mike. Mike uses the same computer Jack used and sees his credit card information. The both know what they gonna do with it a brand new home theater system for themselves at Jacks expense. Jack gets his credit card statement and he is definitely not very happy.
Remember to choose strong passwords instead of weak passwords. Weak passwords are like leaving your keys in your door, allowing anyone to access your personal space or information. Strong passwords greatly reduce that risk because they have a minimum 9 characters, including upper and lower case letters, numbers zero through nine and some unique symbols such as the pound or dollar signs.
One more situation to imagine, Freda is going to use the public computer to check her email. She gets a popup asking her if she would like to save her password. Freda thinks and finally she decides to say No. Good job Freda.
Never open suspicious email attachments. Hackers use email attachments to send viruses to computers. An email virus can destroy files on your hard drive and resend itself to other users. It can also steal your sensitive information and turn your computer into zombie.
You must definitely use antivirus software and update it regularly too. If you still do not have any program, carefully read several Antivirus Software Reviews before installing it and choose something according to your needs.