Angélica González Arrieta, Daniel López-Sánchez, Á. L. Sánchez Lázaro, José R. García-Bermejo-Giner, B. P. Lancho, P. I. V. Cruz, J. A. Hernández Simón
{"title":"使用2FA提高教学/学习过程的安全性","authors":"Angélica González Arrieta, Daniel López-Sánchez, Á. L. Sánchez Lázaro, José R. García-Bermejo-Giner, B. P. Lancho, P. I. V. Cruz, J. A. Hernández Simón","doi":"10.1109/JICV53222.2021.9600397","DOIUrl":null,"url":null,"abstract":"In the teaching/learning process there is a need to identify or, where appropriate, validate the identity of users accessing the various IT services used by the institution responsible for the courses offered. In the case of Universities, the following services are used, among others: email, a content management platform such as Moodle and shared cloud storage spaces such as Drive or Dropbox [6]. Through these services, teachers store work materials, assessment tests, student identification, assessment results and personal data. This is the way to ensure that each actor gets access to just the functionality granted by the system administrator. Currently, it is considered that using a single step method, particularly the use of a username/password pair, is not enough to ensure safe access. Therefore the use of a second authentication factor is required. Two-factor authentication factor (2FA) can be implemented in software or in hardware. This paper shows a survey of the situation at the University of Salamanca. Further, different alternatives for the implementation of a second authentication factor are proposed, analyzing the advantages and disadvantages of each method.","PeriodicalId":448299,"journal":{"name":"2021 XI International Conference on Virtual Campus (JICV)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Increasing security in the teaching/learning process with 2FA\",\"authors\":\"Angélica González Arrieta, Daniel López-Sánchez, Á. L. Sánchez Lázaro, José R. García-Bermejo-Giner, B. P. Lancho, P. I. V. Cruz, J. A. Hernández Simón\",\"doi\":\"10.1109/JICV53222.2021.9600397\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the teaching/learning process there is a need to identify or, where appropriate, validate the identity of users accessing the various IT services used by the institution responsible for the courses offered. In the case of Universities, the following services are used, among others: email, a content management platform such as Moodle and shared cloud storage spaces such as Drive or Dropbox [6]. Through these services, teachers store work materials, assessment tests, student identification, assessment results and personal data. This is the way to ensure that each actor gets access to just the functionality granted by the system administrator. Currently, it is considered that using a single step method, particularly the use of a username/password pair, is not enough to ensure safe access. Therefore the use of a second authentication factor is required. Two-factor authentication factor (2FA) can be implemented in software or in hardware. This paper shows a survey of the situation at the University of Salamanca. Further, different alternatives for the implementation of a second authentication factor are proposed, analyzing the advantages and disadvantages of each method.\",\"PeriodicalId\":448299,\"journal\":{\"name\":\"2021 XI International Conference on Virtual Campus (JICV)\",\"volume\":\"104 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 XI International Conference on Virtual Campus (JICV)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/JICV53222.2021.9600397\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 XI International Conference on Virtual Campus (JICV)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JICV53222.2021.9600397","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Increasing security in the teaching/learning process with 2FA
In the teaching/learning process there is a need to identify or, where appropriate, validate the identity of users accessing the various IT services used by the institution responsible for the courses offered. In the case of Universities, the following services are used, among others: email, a content management platform such as Moodle and shared cloud storage spaces such as Drive or Dropbox [6]. Through these services, teachers store work materials, assessment tests, student identification, assessment results and personal data. This is the way to ensure that each actor gets access to just the functionality granted by the system administrator. Currently, it is considered that using a single step method, particularly the use of a username/password pair, is not enough to ensure safe access. Therefore the use of a second authentication factor is required. Two-factor authentication factor (2FA) can be implemented in software or in hardware. This paper shows a survey of the situation at the University of Salamanca. Further, different alternatives for the implementation of a second authentication factor are proposed, analyzing the advantages and disadvantages of each method.