Wyniki 1-1 spośród 1 dla zapytania: authorDesc:"Saule NYSANBAYEVA "

Algorithm for generating temporary password based on the two- factor authentication model DOI:10.15199/48.2019.05.25

Czytaj za darmo! »

Currently while ensuring information security in an automated priority management system is ensuring the availability, integrity of configuration management information and information about personal data. Increased attention has been paid to the prevention of unauthorized access to the system to maintain its stable functioning [1]. However, due to the constantly increasing number of different services and various attacks on user accounts, there is a need to use two-factor authentication methods to ensure information security. In the past decade, these methods have been widely used in various areas of information and communication technologies. They are related to issues of identification and access of a subject to confidential information [2, 3]. They are trusted by a large number of companies, including high-tech organizations, financial and insurance sectors of the market, large banking institutions and public sector enterprises, independent expert organizations, as well as research firms [1]. Two-factor authentication - a security processing algorithm, in which the user provides two different factor authentication, which will improve the protection of user’s data and access to user credentials, and the user's resources. Traditional systems use a username and password for authentication. This method provides a minimum level of security, since the names and passwords can be easily intercepted and even guessed. Two-factor authentication provides a higher degree of protection than single-factor authentication, in which the user offers only one factor, usually a password. Authentication methods with two factors depend on the password and the second factor. Two-factor authentication is used to control access to sensitive systems and data. Development and use of two-factor authentication algorithm for the automated control systems. Goals and objectives of the study The purpose of the article is to develop a two-factor [...]

 Strona 1