<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/security/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 02 Jan 2020 15:42:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>security - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A life cycle approach for IoT security</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/</link>
		
		<dc:creator><![CDATA[Kévin Guérin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2019 20:59:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Life cycle]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12089</guid>

					<description><![CDATA[<p>As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">A life cycle approach for IoT security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major points to be addressed at each event in the life of a connected object.</p>
<h2>What are the risks in the iot world?</h2>
<p>The IoT advent has enabled millions of new potential technological advantages for consumers and companies. However, with <strong>these new advantages</strong>, certain risks are higher in the field of connected devices.</p>
<p>&nbsp;</p>
<figure id="post-12098 media-12098" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-12098 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1.png" alt="" width="1441" height="977" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1.png 1441w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-282x191.png 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-768x521.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-58x39.png 58w" sizes="(max-width: 1441px) 100vw, 1441px" /></figure>
<p style="text-align: center;"><em>Figure 1 – Most significant risks in the IoT world</em></p>
<p>&nbsp;</p>
<p>These business and technological risks which could cause significant potential impacts for consumers and companies, should be identified <strong>from the upstream phases of an IoT project.</strong></p>
<p>&nbsp;</p>
<h2>Which project methodology to choose in order to ensure security of connected devices?</h2>
<p>Even though security issues to address in IoT project are common for all project, we think necessary <strong>to structure reflections regarding the life cycle of the connected device</strong>.</p>
<p>The diagram below highlights all the stages of their life cycle.</p>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter wp-image-12096 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2.png" alt="" width="1479" height="755" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2.png 1479w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-768x392.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-71x36.png 71w" sizes="(max-width: 1479px) 100vw, 1479px" /></p>
<p style="text-align: center;"><em>Figure 2- A life cycle enabling to address all the security issues</em></p>
<p>&nbsp;</p>
<p>Let us review  some important issues raised by this approach:</p>
<ol>
<li><strong>Design, manufacturing, and distribution phases</strong></li>
</ol>
<p>This first phase addresses issues related to the design of the object, regarding business stakes, targeted users (B2B, B2C, B2E), deployment environment (controlled or not) and criticality of the use:</p>
<ul>
<li>What are the regulatory constraints related to the use of the object?</li>
<li>What identity should be labeled and how is this identity created?</li>
<li>How is the security related to object’s hardware and software secrets and data stored in the object?</li>
<li>How is the state of a device on the management platform initialized, ensuring it has no right on the IS before the initialization step?</li>
</ul>
<p>The determined choices during the manufacturing phases are crucial because they determine characteristics and capacities of the device. Some of them will therefore be immutable throughout the life of the device and will impose strong constraints in the following steps.</p>
<p>Furthermore, although the end of the manufacturing phase marks the beginning of the existence of the device on the device management platform, there is still no reason to consider an interaction with the IS.</p>
<p>Any interaction before the device’s association to a user (physical or moral) would mean that it has been diverted in the distribution phase. <strong>Any access to the IS before the initialization phase must be strictly limited</strong> to the firmware update (version N installed at the factory and version N+1 available when unpacking) or to the pre-customization of the object (operating settings or injection of secrets not related to the user). Beyond IS security, an object that is unused before any pairing phase will reduce the risk of theft of that object in the factory or during distribution<em>.</em></p>
<ol start="2">
<li><strong>Initialization phase</strong></li>
</ol>
<p>Initialization phase materializes the association phase (also named pairing) between a device and its owner. Any data generated by the device (or realized action) is then declared as belonging or attributed to its owner..</p>
<p>Therefore, the main challenge is to <strong>ensure a reliable level of user / object association corresponding to the following business stakes:</strong></p>
<ul>
<li>Low level of association required (low-risk situation): An employee declares the usage of an attendance identification system in the meeting room;</li>
<li>Strong level of association required (high-risk situation): when purchasing a connected lock, a consumer provides a serial number and a one-time secret code to allow his mobile application to unlock the door of his home.</li>
</ul>
<p>It is very important to find a balance between the user experience and security.</p>
<p>The robustness of the expected association will <strong>vary according to the nature of the services to which the customer has subscribed.</strong></p>
<ol start="3">
<li><strong>Use phase</strong></li>
</ol>
<p>The definition of the use cases of connected devices is the most anticipated step by companies, however <strong>many aspects of security remain neglected</strong>.</p>
<p>Besides business use cases, additional questions must be raised:</p>
<ul>
<li>How can regular updates of the connected device be implemented?</li>
<li>What are the different actors of the company roles regarding the maintenance of the device operating system layer: the application layer, and the network module?</li>
<li>What is the detection and response requirements for a compromised device?</li>
<li>How to take advantage of the company SIEM (<strong><em>S</em></strong><em>ecurity <strong>I</strong>nformation and <strong>E</strong>vent <strong>M</strong>anagement</em>) and SOC (<strong><em>S</em></strong><em>ecurity <strong>O</strong>peration <strong>C</strong>enter</em>) for technical security incidents (software compromise of the device) and for business security incidents (misuse or theft of a device)?</li>
<li>How can backward compatibility of protocols and APIs used by different versions of the same type of device be maintained?</li>
<li>What are the models of roles and interactions between different populations acting on the object?</li>
</ul>
<p>Concerning this last question, and as an example, the scheme below illustrates the potential complexity stemming from the interactions and roles model such as a connected vehicle.</p>
<p>&nbsp;</p>
<p><img decoding="async" class="aligncenter wp-image-12094 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3.png" alt="" width="1464" height="725" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3.png 1464w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-386x191.png 386w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-768x380.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-71x35.png 71w" sizes="(max-width: 1464px) 100vw, 1464px" /></p>
<p style="text-align: center;"><em>Figure 3- Example of a roles and interactions model with a connected vehicle (research carried out with IMT Atlantique)</em></p>
<p>&nbsp;</p>
<ol start="4">
<li><strong>Resale phase</strong></li>
</ol>
<p>Today, the resale is <strong>the most neglected</strong> phase during the device design. This event essentially concerns devices for B2C markets and raises very specific issues:</p>
<ul>
<li>How to detect and handle the resale of a device between individuals?</li>
<li>What privacy-by-design principles should be implemented to protect secrets and data from the former owner while resetting a device?</li>
<li>How can access rights of the former owner of the device be removed?</li>
<li>What are the ways to reset a device in a stable and clean state before re-pairing?</li>
</ul>
<p>The major difficulty involves <strong>the detection of the resale event</strong> which triggers the device/user unpairing processes, reset the state of the object, etc.</p>
<p>Our experience allows us to identify some circumstances that could indicate a change of ownership.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12092 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4.png" alt="" width="1463" height="509" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4.png 1463w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-437x152.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-768x267.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-71x25.png 71w" sizes="auto, (max-width: 1463px) 100vw, 1463px" /></p>
<p style="text-align: center;"><em>Figure 4 – Examples of events that could indicate the change of ownership</em></p>
<p>&nbsp;</p>
<p>Despite such examples, we witness that resale remains a complex event to identify. Thus, some companies choose <strong>not to authorize the device resale</strong> via a lease contract. The device must therefore be returned when the service is terminated; otherwise it must be made unusable. This model is comparable to renting an Internet box with an ISP (<strong>I</strong>nternet <strong>S</strong>ervice <strong>P</strong>rovider).</p>
<ol start="5">
<li><strong>End-of-life and recycling</strong></li>
</ol>
<p>Although<strong> essential</strong>, we currently have little perspective on this step, however there are multiple stakes:</p>
<ul>
<li>Revoke access rights on the Information System of an end-of-life device;</li>
<li>Renew the identity of a recycled device;</li>
<li>Ensure the replacement of a defective object by re-associating a new one with the same owner and the same data;</li>
<li>Detect the inactivity of a device to trigger a replacement.</li>
</ul>
<p>The main risks are <strong>the loss of access control over the company IS</strong> via identifiers associated with recycled devices, <strong>the disclosure of personal data</strong> of the former owner or <strong>the additional cost of license</strong> for data generated by devices considered out of the scope.</p>
<p>&nbsp;</p>
<h2>A variable capacity of action in response to the risks according to the nature of the project</h2>
<p>At this stage of your reading, you probably think that this article is not your concern because you purchase pre-conceived connected modules or devices.</p>
<p>Unfortunately this mindset is wrong –  you are still exposed to the same risks! Even though you only purchase or welcome connected devices in your IS, by addressing all the issues above you will be able to feed the contents of requirement specifications to suppliers.</p>
<p>To conclude, <strong>whatever the nature of your IoT project</strong>, it is essential to design your object by structuring the reflections around its life cycle: from its manufacturing to its disposal. It is therefore necessary, at each stage, to address all the relevant security themes: Network / application / hardware security, standards, detection and reaction, governance, maintenance in security condition&#8230;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12090 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5.png" alt="" width="807" height="589" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5.png 807w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-262x191.png 262w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-768x561.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-53x39.png 53w" sizes="auto, (max-width: 807px) 100vw, 807px" /></p>
<p style="text-align: center;"><em>Figure 5 – Main security themes for an IoT project</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">A life cycle approach for IoT security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Painsswords: a look at the alternatives to passwords?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/</link>
		
		<dc:creator><![CDATA[J3remYp4GeauX]]></dc:creator>
		<pubDate>Mon, 16 Jul 2018 16:40:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[user experience]]></category>
		<category><![CDATA[user friendly]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11108/</guid>

					<description><![CDATA[<p>We’re using more and more online services—both at home and at work. This transformation in usage calls for a review of authentication methods—and there are two main needs that must be balanced: the user experience (and how to maintain it),...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/">Painsswords: a look at the alternatives to passwords?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We’re using more and more online services—both at home and at work. This transformation in usage calls for a review of authentication methods—and there are two main needs that must be balanced: the user experience (and how to maintain it), and security (and how to protect access to services).</em></p>
<h2>Calling time on passwords</h2>
<p>Authentication means using an agreed method to prove that someone is the person they claim to be. From the earliest times, the most widely used method has been, almost certainly, the password. However, passwords are an irritation for users and have numerous security limitations.</p>
<p><strong>A collective sense of having &#8220;had enough&#8221;&#8230;</strong></p>
<p>We all imagine, from time to time, not having to rack our brains for the right password when we connect to our most used applications. But it’s clear that this remains just a fantasy at present.<br />
The promise of single sign-on is a long way from being a reality in corporate settings, and the increasing popularity of password vaults reveals something of the challenges faced by users: the multiplicity and patchy relevance of password policies, obligatory password changes, not to mention the irritation of having to reset passwords.<br />
Having said that, the password’s main advantage remains its universal applicability and familiarity.</p>
<figure id="post-11109 media-11109" class="align-center"></figure>
<p><strong>&#8230;but with a limited degree of security</strong></p>
<p>Many cyber-attack scenarios rely, at some point or other, on a password—ideally that of a privileged account—being compromised. Various techniques are employed: high-volume combination tests (Brute Force), intercepting communications (Man in The Middle), and reconstituting passwords from their footprints (Rainbow Table).</p>
<figure id="post-11109 media-11109" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11109" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1.png" alt="" width="734" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1.png 734w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-1-69x39.png 69w" sizes="auto, (max-width: 734px) 100vw, 734px" /></figure>
<p>Security measures to guard against these attacks exist (such as encryption, hashing, salting, and blocking accounts), but these are not always implemented systematically—or satisfactorily. As the saying goes, <em>&#8220;From a corporate point of view, passwords are like nuclear waste: just bury them deep and hope they don’t leak.&#8221;</em></p>
<p>In addition to the technical weaknesses already discussed, user behavior presents a major risk: reusing the same password for different applications, passwords that are too weak or easy to guess, incrementation, etc. When a password is reused for several applications, it acts as the weakest link—thus weakening the whole chain.</p>
<p>Ultimately, the poor user experience and limited level of security offered by passwords are forcing companies to look for new authentication methods.</p>
<h2>What are the options?</h2>
<p>Authentication methods are generally divided into four categories:</p>
<figure id="post-11112 media-11112" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11112" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2.png" alt="" width="940" height="454" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2.png 940w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-2-71x34.png 71w" sizes="auto, (max-width: 940px) 100vw, 940px" /></figure>
<p>&nbsp;</p>
<p><strong>What I know</strong></p>
<p>These authentication methods are based on a key or code that the user knows. They represent the bulk of the solutions used today in both professional and private setting. Today’s solutions include traditional passwords, PIN codes, and secret questions. The latter, however, are rarely used, because they are either too generic (for example, &#8220;What’s your favorite color? &#8220;) or too difficult to remember.</p>
<p><strong>What I own</strong></p>
<p>Here, security is based on a specific piece of equipment being in the user&#8217;s possession. In particular, we are seeing the following in use:</p>
<ul>
<li><strong>Smartphones</strong></li>
</ul>
<p>Smartphones allow—both in professional and private settings—the securing of the most sensitive operations: accessing internal company networks, confirming online payments, or carrying out non-typical banking operations.</p>
<p>Smartphones can be used to achieve authentication in a number of ways:</p>
<figure id="post-11114 media-11114" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11114" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3.png" alt="" width="656" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3.png 656w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3-303x191.png 303w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-3-62x39.png 62w" sizes="auto, (max-width: 656px) 100vw, 656px" /></figure>
<ul>
<li><strong>Authentication tokens</strong></li>
</ul>
<p>A token often takes the form of a mini-calculator that makes it possible to generate a single-use code (OTP), with the token itself protected by a PIN code chosen by the user. Historically widely used in companies (for VPN access in particular), and occasionally in the private sphere to connect to particular customer areas, tokens are, nonetheless, giving way to smartphones, which provide a less expensive method.</p>
<ul>
<li><strong>Smartcards</strong></li>
</ul>
<p>Smartcards contain a certificate that is used to prove the holder&#8217;s identity. A card reader is essential for this type of authentication; moreover, certificate management requires infrastructure and life-cycle-management procedures (covering issue, withdrawal, loss, etc.). Normally reserved for the corporate world, their use tends to be limited to specific groups or uses (IT administration, financial operations, etc.).</p>
<ul>
<li><strong>U2F keys</strong></li>
</ul>
<p>This item comes in the form of a standard USB stick, but instead of storing files, it stores a unique key linked to the user. Based on a standard developed by the FIDO Alliance, the solution combines a robust level of security (including resistance to phishing attacks) with a good user experience (the keys can remain connected to one of the device&#8217;s USB ports) because a simple key press is sufficient for authentication. Note, however, that this does not involve fingerprint recognition.</p>
<ul>
<li>A <strong>connected object</strong>, such as a watch</li>
</ul>
<p>This last solution—the most innovative in this category— allows users to connect <em>via</em> a connected object that they already own. As an authentication method it’s little used in corporate settings, but Apple, for example, offers an option to unlock a computer by simply approaching a device with another Apple connected object.</p>
<p>Solutions like this, based on the possession of a device, are differentiated mainly by their degree of ergonomics. In any case, it’s essential to manage &#8220;enrollment&#8221; (the linking of the object to its holder), replacement, loss, and theft of the relevant device.</p>
<p><strong>Who I am</strong></p>
<p>The physiological characteristics of a person, such as a fingerprint, the vein pattern of a hand, irises, faces, the signature of a voice, or even a heart rate, also make it possible to authenticate a user. The use of these solutions, for most people, is limited to opening their workstation or smartphone (<em>via</em> a fingerprint or face recognition). However, companies have used such solutions for a number of years to control access to rooms or highly sensitive areas.</p>
<p><strong>What I do</strong></p>
<p>Keystroke rhythms, mouse movements, using a phone, or touching a screen, are different ways to distinguish a legitimate user from an impostor or robot. These behavioral, biometric solutions require a large amount of data in order to be reliable, but this is improving, thanks to new Machine-Learning-based approaches. These solutions are used more as security measures that complement authentication (detecting robotic-attacks, account sharing, etc.).</p>
<p>As a summary, the figure below shows the different authentication solutions according to their level of security and ease of use.</p>
<figure id="post-11117 media-11117" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-11117" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4.png" alt="" width="616" height="438" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4.png 616w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-269x191.png 269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-55x39.png 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/07/MX_Image-4-345x245.png 345w" sizes="auto, (max-width: 616px) 100vw, 616px" /></figure>
<h2>User experience and security, a circle that can&#8217;t be squared?</h2>
<p>We believe that it is possible to reconcile the user experience with security. Below we set out four possible routes to achieving it.</p>
<h3>Route 1: simplifying the use of passwords</h3>
<p>While it seems too fantastic to imagine the use of passwords being completely abandoned, some of their failings can be addressed. The frequency of data entry can already be reduced <em>via</em> identity-federation mechanisms that provide access to both corporate and partner services. In addition, chatbots are emerging to simplify the password resetting process, and are helping drive significant improvements in user experience. As for security, raising users’ awareness about the proper use of passwords is still an essential activity if risks (from social engineering, spam, phishing, password theft, etc.) are to be reduced.</p>
<h3>Route 2: adapting the security requirements to the context</h3>
<p>Just as you have to adapt your road speed to the weather conditions, the concept of risk can guide us in the level of security needed to authenticate a user. Thus, to access non-sensitive information, a simple password will suffice; but more sensitive operations (a bank transfer involving a significant amount, for example) will require the user to be authenticated with greater certainty, using a combination of several authentication factors. Other criteria can be taken into account to assess risk, for example the PC or smartphone being used, the geographical location, the time of connection, or even whether the user is exhibiting their habitual behavior.</p>
<p>Beyond the authentication phase, the level of risk can also influence the time allowed before issuing a new authentication request (no need to retype a Facebook password as long as the user stays on the same PC or smartphone, reauthentication via webmail every X days only, etc.).</p>
<p>In the end, then, authentication is no longer seen as an event but as a <a href="https://twitter.com/bertrandcarlier/status/935876816090353666">continuous process</a>.</p>
<h3>Route 3: let the use choose the authentication method</h3>
<p>Rather than imposing a single authentication method on all users, Bring Your Own Token (BYOT) lets users choose the one that best suits their needs. The idea is to offer a choice of solutions with comparable levels of security.</p>
<p>Today, Facebook and Google offer BYOT as a second authentication factor, using a registered smartphone or secure USB key, for example.</p>
<p>In the world of work, this method remains less developed at present, but it’s easy to imagine such a method being offered to specific groups: those with particular work mobility requirements, the technological appetite for it, etc.</p>
<h3>Route 4: make use of accounts that exist already</h3>
<p>It’s more and more common for people to use their social media accounts (Facebook, Google, or LinkedIn, for example) to connect to e-commerce sites or other websites. A Social Login enables the creation of an account on the new site to be simplified, and limits the number of passwords to be remembered.</p>
<p>However, not all online services are designed to use a Social Login. Public or parapublic services for example, favor a State Login which allows users to log in using a tax, health, or similar identifier, and to carry out a range of online administrative activities. And these uses are in continuous development.</p>
<figure id="post-10334 media-10334" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-10334" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1.png" alt="" width="284" height="356" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1-152x191.png 152w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/02/image-1-31x39.png 31w" sizes="auto, (max-width: 284px) 100vw, 284px" /></figure>
<h2>In conclusion</h2>
<p>While passwords are not set to disappear completely, the search for alternatives is gathering pace: uses and technological solutions are evolving rapidly, consortia and new standards (such as OAuth2 and OIDC) are emerging, and, these days, the user experience, as well as security, is core to the thinking.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/07/painsswords-a-look-at-the-alternatives-to-passwords/">Painsswords: a look at the alternatives to passwords?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
