Hacker attacks aimed at stealing credentials or encrypting sensitive user data are constantly increasing. For this reason, cybersecurity has become an ever more popular topic in recent years, and one on which both public administration and private companies are progressively convinced to make investments in both time and money. One of the most fragile points in security is undoubtedly authentication, which is mostly still based on a single-factor mode, especially in the case of access to virtual machines or physical computing devices. A change in access mode, however, is far from easy to enforce. In this paper we will see how it is possible to adopt two-factor authentication for system access, in a company with a considerable historical background and an heterogeneous and high amount of systems to be adapted.
Adoption of Two-Factor Authentication in a Pre-Existing Heterogeneous System
Benetti, ElisaPrimo
;Mazzini, Gianluca
Ultimo
2023
Abstract
Hacker attacks aimed at stealing credentials or encrypting sensitive user data are constantly increasing. For this reason, cybersecurity has become an ever more popular topic in recent years, and one on which both public administration and private companies are progressively convinced to make investments in both time and money. One of the most fragile points in security is undoubtedly authentication, which is mostly still based on a single-factor mode, especially in the case of access to virtual machines or physical computing devices. A change in access mode, however, is far from easy to enforce. In this paper we will see how it is possible to adopt two-factor authentication for system access, in a company with a considerable historical background and an heterogeneous and high amount of systems to be adapted.| File | Dimensione | Formato | |
|---|---|---|---|
|
308.pdf
solo gestori archivio
Descrizione: Post-print
Tipologia:
Post-print
Licenza:
NON PUBBLICO - Accesso privato/ristretto
Dimensione
149.64 kB
Formato
Adobe PDF
|
149.64 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in SFERA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


