Article | REF: H5536 V2

Use of authentication in the banking sector

Author: Pascal THONIEL

Publication date: February 10, 2021

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


Overview

Français

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHOR

  • Pascal THONIEL: Founder and R&D Director of NTX Research SA

 INTRODUCTION

Whether accessing local or wide-area networks, wired or wireless, client-server or distributed, authentication of equipment, connected objects, services, applications and people is essential. Everything to do with private access, i.e. controlling the delivery of information and the provision of resources reserved for certain entities, requires authentication.

Conventional login and password authentication procedures are no longer sufficient. On local networks as on the Internet, communications espionage is the number one attack. By spying on communications, the user ID and password sent to the server, or the access codes used during a legitimate connection, can be recovered easily and virtually undetected. Nothing could be simpler for the attacker than to log in again, replaying the same values and pretending to be an authorized user. This is identity theft.

The second type of attack involves spying on, simulating, copying or stealing the user's authentication credentials. The third involves the recovery of user authentication elements (credentials) stored on the authentication server side. The fourth is social engineering, which aims to deceive the user's vigilance by cleverly getting them to voluntarily reveal their passwords, codes or secrets, or even to guess them. Indeed, users often choose weak passwords (short, simple, classic) or passwords that correspond to them (children's first names, birthdates, name of the dog in the house, name of the favorite artist or sportsman...) in order to remember them more easily. Finally, the fifth is the so-called "brute force" attack, which consists, for example, in systematically and automatically trying out all possible passwords or encryption keys until the right ones are found. As the passwords used are often short (less than 8 characters) and simple (letters and numbers), the brute force attack is sometimes very effective.

The stakes are all the higher because these threats to individuals, businesses, organizations, government agencies and their information systems are very real. They are also fraught with consequences in the event of a successful intrusion attack. Fraudulent intrusion into an information system through lack of user control or usurpation of an authorized user's identity can have serious consequences, commensurate with the access and action rights allocated to that user.

These generalities apply in full to today's banking IT, which is the foundation of banking services accessible anywhere, anytime, thanks to the power of the Internet. Since the financial stakes have always been among the highest, authentication is not a security function to be neglected. It clearly occupies a central place in today's banking security.

The recent...

You do not have access to this resource.

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


The Ultimate Scientific and Technical Reference

A Comprehensive Knowledge Base, with over 1,200 authors and 100 scientific advisors
+ More than 10,000 articles and 1,000 how-to sheets, over 800 new or updated articles every year
From design to prototyping, right through to industrialization, the reference for securing the development of your industrial projects

This article is included in

Security of information systems

This offer includes:

Knowledge Base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

Practical Path

Operational and didactic, to guarantee the acquisition of transversal skills

Doc & Quiz

Interactive articles with quizzes, for constructive reading

Subscribe now!

Ongoing reading
Authentication in the banking sector