C H A P T E R  9

Two-Factor Authentication

What would life be like if there were no imposters, no charlatans, and no thieves? Sorry, that rhetorical question does not provide any security. Neither does putting on a set of rose-colored glasses and believing that we are secure just because we’ve implemented substantial security measures. We will always be susceptible to trickery and carelessness. The weakest link, even with upright associates, is always a person taking shortcuts. Social engineering and lack of attention to our computer security code of conduct (like, don’t write down your password, don’t share your password, use complex passwords, and change your password periodically) give thieves entrance to our most secure systems.

So, we ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.