Page 971 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 971

Some organizations use the same concepts but provide the PIN via a
               software application running on the user’s device. As an example,

               Symantec supports the VIP Access app. After it’s configured to work
               with an authentication server, it sends a new six-digit PIN to the app
               every 30 seconds.



                  Onetime Password Generators


                  Onetime passwords are dynamic passwords that change every time

                  they are used. They can be effective for security purposes, but most
                  people find it difficult to remember passwords that change so
                  frequently. Onetime password generators are token devices that
                  create passwords, making onetime passwords reasonable to
                  deploy. With token-device-based authentication systems, an
                  environment can benefit from the strength of onetime passwords
                  without relying on users to be able to memorize complex

                  passwords.



               Two-Step Authentication


               A trend that many online organizations are using is two-step
               authentication. As an example, imagine that you do online banking
               and log on with a username and password. Your bank recently
               required you to provide your cell phone number. Now, when you log
               on, the bank’s website indicates that it sent a text message to your
               phone with a code. It then prompts you to enter the code to complete
               the logon process. Sure enough, when you look at your smartphone

               you see a six-digit numeric code. After entering it on the website,
               you’re logged on.

               In this scenario, your smartphone is effectively mimicking a hardware
               token, making this two-factor authentication, though many
               organizations such as Google call it two-step authentication. This
               process typically takes advantage of one of the following standards.

               HOTP The hash message authentication code (HMAC) includes a

               hash function used by the HMAC-based One-Time Password (HOTP)
               standard to create onetime passwords. It typically creates HOTP
   966   967   968   969   970   971   972   973   974   975   976