
Improving Application Security: Trends and Two-Factor Authentication
Discover the importance of application security and the evolution of vulnerabilities over the years. Learn about two-factor authentication, its implementation, pros and cons, and explore a web application demonstration. Stay informed on compliance standards, secure coding practices, and mobile authentication methods.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Application Security TAEWAN KANG, KEVIN HUANGFU
Importance of Application Security http://www.quotium.com/content/uploads/2014/10/quotium-2014- 1.jpg
Did we get better? According to IBM X-Force, the annual growth rate in disclosed application vulnerabilities was 60% from 1996 to 2006, and is only 9% from 2006 to 2014.
How it improved? more compliance standards adopting secure coding practices.
Two-Factor Authentication Multi-Factor Authentication One-Factor: Something the user knows (i.e. password) Two-Factor: Something the user has (i.e. verification code) Three-Factor: Something the user is (i.e. fingerprint scan)
How It Works A secondary check in addition to a password (one-factor) Uses tokens during a secondary authentication step Tokens Hard Tokens: hardware devices that user carries Soft Tokens: software-based security tokens
Mobile Authentication Hard token Soft Token Three-Factor
Pros and Cons: Two-Factor PROs CONs Provides high level protection at reasonable costs (98% coverage) Less effective than three-factor authentication (99.99% coverage) Easy to implement Near useless if hackers hack into your method of secondary authentication Many ways to implement
Web-Application Demonstration https://twofactorauthtest.herokuapp.com/
Simple Mail Transfer Protocol Simple Mail Transfer Protocol (SMTP) Internet standard for electronic mail SMTP servers are responsible for email delivery