Demystifying the technical and managerial challenges of authentication

Document Type

Conference Proceeding

Publication Title

Proceedings of the 6th Annual Conference on Computational Science and Computational Intelligence

Publisher

IEEE

School

School of Science / ECU Security Research Institute

RAS ID

30825

Comments

Goodwin, B., & Szewczyk, P. (2019, December). Demystifying the technical and managerial challenges of authentication. In the IEEE 2019 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 26-33). IEEE.

https://doi.org/10.1109/CSCI49370.2019.00012

Abstract

Authentication mechanisms are a core component in cyber-security and are becoming increasingly exposed as traditional networks extend into the cloud. The resulting systems become harder to define, harder to protect, and authentication mechanisms are left vulnerable to attacks. Compounding this is the human factor, where a poor understanding of responsibilities, reluctance to deal with conflict, and the inability to effect change, undermine what is often considered to be a technical problem. Whilst technical measures to effectively mitigate these risks are known, frequency of attacks continue to demonstrate success. Using six popular cyber-breach examples these non-technical challenges are identified and their effect is examined. This paper demonstrates that technical measures are key to authentication and overall cyber-security posture. These technical measures may be better understood than their non-technical counterparts that frequently lead to authentication failure and public downfall.

DOI

10.1109/CSCI49370.2019.00012

Access Rights

subscription content

Share

 
COinS