Demystifying the technical and managerial challenges of authentication
Document Type
Conference Proceeding
Publication Title
Proceedings of the 6th Annual Conference on Computational Science and Computational Intelligence
Publisher
IEEE
School
School of Science / ECU Security Research Institute
RAS ID
30825
Abstract
Authentication mechanisms are a core component in cyber-security and are becoming increasingly exposed as traditional networks extend into the cloud. The resulting systems become harder to define, harder to protect, and authentication mechanisms are left vulnerable to attacks. Compounding this is the human factor, where a poor understanding of responsibilities, reluctance to deal with conflict, and the inability to effect change, undermine what is often considered to be a technical problem. Whilst technical measures to effectively mitigate these risks are known, frequency of attacks continue to demonstrate success. Using six popular cyber-breach examples these non-technical challenges are identified and their effect is examined. This paper demonstrates that technical measures are key to authentication and overall cyber-security posture. These technical measures may be better understood than their non-technical counterparts that frequently lead to authentication failure and public downfall.
DOI
10.1109/CSCI49370.2019.00012
Access Rights
subscription content
Comments
Goodwin, B., & Szewczyk, P. (2019, December). Demystifying the technical and managerial challenges of authentication. In the IEEE 2019 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 26-33). IEEE.
https://doi.org/10.1109/CSCI49370.2019.00012