O'Reilly logo

Two-Factor Authentication by Mark Stanislav

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2: RISKS TO ONE-FACTOR AUTHENTICATION

Our solutions are also our problems

Depending on your level of computing technology experience, you may be more or less familiar with three major models in architecture:

1 Mainframe computing

2 Client–server computing

3 Cloud-mobile computing

Each of these models represents a fundamental shift in the way computing architects leverage resources (memory, storage, processing power, etc.) and how those resources are made available to end-users.

In mainframe computing, the resources were highly centralised, with perhaps a couple of large machines that would allow many users to access them and share resources. A client–server model, however, shifted much of the computing resources and effort down to individual ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required