首页> 外文期刊>信息安全(英文) >Remote Access Communications Security: Analysis of User Authentication Roles in Organizations
【24h】

Remote Access Communications Security: Analysis of User Authentication Roles in Organizations

机译:远程访问通信安全性:组织中的用户身份验证角色分析

获取原文
获取原文并翻译 | 示例
       

摘要

Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.
机译:远程访问是访问一个立即物理位置之外的资源的手段。这使得员工的流动性更加有效和生产性大多数组织。可以通过各种远程通信通道实现远程访问,最常见的虚拟专用网络(VPN)。对远程访问的需求正在上升,特别是在Covid-19大流行期间,随着大多数组织重新构建的,将继续增加,以便远程办公将永久性部分的操作模式。员工移动性,同时提出具有一些优势的组织,随着将企业网络资产暴露给攻击者的相关风险。远程用户和远程连接技术存在一些漏洞,可以由任何威胁代理商利用,以违反这些网络资产的机密性,完整性和可用性(CIA)维度。那么,用户和远程设备如何进行身份验证?确保建立的连接在多大程度上是多少?通过员工移动性上升,必须分析用户认证角色,因为移动员工不属于组织的监控雷达,以及移动员工连接可能易受攻击的环境。在本研究中,设置了一个实验以确定用户认证角色。实验显示了用户认证中的2FA的过程,并且证明是在远程访问期间改善用户身份验证的有效手段。除了用户知道的内容之外,还通过使用用户具有(移动电话/软令牌)作为第二因素来描绘的这一点。此身份验证方法克服了通过仅使用密码来克服单因素用户身份验证固有的安全弱点。然而,结果还表明,虽然2FA用户认证确保了安全性,但远程设备可以表现出进一步的漏洞并对组织构成严重风险。因此,建议使用各种实施方式,以进一步增强关于远程用户身份验证的远程访问通信的安全性。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号