Study: My Understanding of Security

Mobile Authentication Methods and How They Can be Managed

Mobile devices require both user and endpoint authentication whenever the device is connected to a business network. Authentication acts as a security measure that verifies the users and the systems whether they are who they claim to be. By asking for identity and credentials, the system is able to secure your device.

Lack of a proper system of authentication leads to many breaches like cracked passwords for wireless networks and unlocked computers. Mentioned herein are examples of authentication methods and ways in which they can be managed.

Identity Authentication methods

A secure mobile authentication technique should be one that is combining the strength and enforce ability with the usability of the method. The device and network credentials should always be the ones to guide you in ensuring that the method you select meets the security, platform and user requirements.

How to deal with Passwords

Simple passwords are easy to guess hence the need to have a long, complex password that has a timeout rule. If you use complex passwords on your mobile device, it might prove hard to use. Passwords that are used on mobile devices should be cater to the mobile needs to ease the usage of the phone, for example, let the user receive calls and other notifications without entering a password.

How to use Digital Certificates to confirm user Identity

Certificates are deemed to be stronger than passwords as they are used to bind an identity to a private or public key. An example of this is the case of a laptop that is WI-FI connected, it is switched on with a password and goes on to use a certificate within the device for WPA-Enterprise authentication.

How to authenticate your device using Smart Cards

A smart card is clipped in the memory of an SD/MMC, or a credit card. The smart card chip is used for storage of cryptographic keys used by the authentication and encryption algorithms.

Hardware Tokens for Authentication purpose

Hardware tokens generate a one-time password and are used to authenticate laptop users by many companies. To turn on the machine; the user will enter their password then goes on to type the token provided strings. key-loggers And crackers can be kept off by this method as the passwords that are used are for a one-time usage.The security of your device is guaranteed with this approach as the passwords that are used are never the same in the subsequent logins. Additionally, this method avoids password sharing hence the security is high.

Biometrics as a method of Authentication

The the main logic behind bio-metrics is the fact that it combines a number of factors to bring out the perfect authentication match, by either combining two of these: fingerprints, voice-prints, handwritten, signatures, passwords, and tokens or any other such things. Biometrics can be conveniently used on commonly used mobile devices, but environmental factors must be put into consideration.

Researched here: he said