{"title":"Demystifying the Technical and Managerial Challenges of Authentication","authors":"B. Goodwin, Patryk Szewczyk","doi":"10.1109/CSCI49370.2019.00012","DOIUrl":null,"url":null,"abstract":"Authentication mechanisms are a core component in cyber-security and are becoming increasingly exposed as traditional networks extend into the cloud. The resulting systems become harder to define, harder to protect, and authentication mechanisms are left vulnerable to attacks. Compounding this is the human factor, where a poor understanding of responsibilities, reluctance to deal with conflict, and the inability to effect change, undermine what is often considered to be a technical problem. Whilst technical measures to effectively mitigate these risks are known, frequency of attacks continue to demonstrate success. Using six popular cyber-breach examples these non-technical challenges are identified and their effect is examined. This paper demonstrates that technical measures are key to authentication and overall cyber-security posture. These technical measures may be better understood than their non-technical counterparts that frequently lead to authentication failure and public downfall.","PeriodicalId":103662,"journal":{"name":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI49370.2019.00012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Authentication mechanisms are a core component in cyber-security and are becoming increasingly exposed as traditional networks extend into the cloud. The resulting systems become harder to define, harder to protect, and authentication mechanisms are left vulnerable to attacks. Compounding this is the human factor, where a poor understanding of responsibilities, reluctance to deal with conflict, and the inability to effect change, undermine what is often considered to be a technical problem. Whilst technical measures to effectively mitigate these risks are known, frequency of attacks continue to demonstrate success. Using six popular cyber-breach examples these non-technical challenges are identified and their effect is examined. This paper demonstrates that technical measures are key to authentication and overall cyber-security posture. These technical measures may be better understood than their non-technical counterparts that frequently lead to authentication failure and public downfall.