August 2019
Intermediate to advanced
342 pages
9h 35m
English
To ensure that the credentials really belong to the legitimate owner of the account, over time, various forms of verification have been introduced, some of which are based on the adoption of second authentication factors, such as the insertion of temporary passwords that are transmitted as OTP codes. These are delivered via SMS messages to the user's phone number, or via the email address associated with the user's account. The reliability of such a procedures is based on secondary factors, such as the integrity of the support and channels that are used to receive and manage these authentication factors.
If the user's email account has been hacked or malware has been installed on a smartphone on which SMS ...
Read now
Unlock full access