CHAPTER 2: RISKS TO ONE-FACTOR AUTHENTICATION
Our solutions are also our problems
Depending on your level of computing technology experience, you may be more or less familiar with three major models in architecture:
1 Mainframe computing
2 Client–server computing
3 Cloud-mobile computing
Each of these models represents a fundamental shift in the way computing architects leverage resources (memory, storage, processing power, etc.) and how those resources are made available to end-users.
In mainframe computing, the resources were highly centralised, with perhaps a couple of large machines that would allow many users to access them and share resources. A client–server model, however, shifted much of the computing resources and effort down to individual ...
Get Two-Factor Authentication now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.