Hacker attacks aimed at stealing credentials or encrypting sensitive user data are constantly increasing. For this reason, cybersecurity has become an ever more popular topic in recent years, and one on which both public administration and private companies are progressively convinced to make investments in both time and money. One of the most fragile points in security is undoubtedly authentication, which is mostly still based on a single-factor mode, especially in the case of access to virtual machines or physical computing devices. A change in access mode, however, is far from easy to enforce. In this paper we will see how it is possible to adopt two-factor authentication for system access, in a company with a considerable historical background and an heterogeneous and high amount of systems to be adapted.

Adoption of Two-Factor Authentication in a Pre-Existing Heterogeneous System

Benetti, Elisa
Primo
;
Mazzini, Gianluca
Ultimo
2023

Abstract

Hacker attacks aimed at stealing credentials or encrypting sensitive user data are constantly increasing. For this reason, cybersecurity has become an ever more popular topic in recent years, and one on which both public administration and private companies are progressively convinced to make investments in both time and money. One of the most fragile points in security is undoubtedly authentication, which is mostly still based on a single-factor mode, especially in the case of access to virtual machines or physical computing devices. A change in access mode, however, is far from easy to enforce. In this paper we will see how it is possible to adopt two-factor authentication for system access, in a company with a considerable historical background and an heterogeneous and high amount of systems to be adapted.
2023
9798350301076
two-step verification, cyber security, one-time password, infrastructure protection, access management
File in questo prodotto:
File Dimensione Formato  
308.pdf

solo gestori archivio

Descrizione: Post-print
Tipologia: Post-print
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 149.64 kB
Formato Adobe PDF
149.64 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in SFERA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11392/2624630
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? ND
social impact