Asymmetric Cryptography And Other Authentication Methods

0
Asymmetric Cryptography And Other Authentication Methods

Security is more important than ever – there has been a marked increase in hacking and phishing activity since the start of the pandemic, and this has shown us that we aren’t prepared for cyber threats just as we weren’t ready for a pandemic. The uptick in BYOD and working from home has left us all vulnerable, and in fact 81% of security incidents are due to insecure or weak passwords. Passwords just don’t do enough to protect our devices, and it’s time we start looking at other security measures.

Get The Full Series in PDF

Get the entire 10-part series on Charlie Munger in PDF. Save it to your desktop, read it on your tablet, or email to your colleagues.

Q3 2020 hedge fund letters, conferences and more

The Problem With Multi Factor Authentication

For a while the best way to secure our devices and accounts was through multi factor authentication. After inputting our login credentials - a username and a password - we would be promoted to answer security questions as an additional layer of security. There’s just one problem - both the passwords and the security questions rely on shared secrets, and currently there are more than 15 billion stolen credentials for sale on the dark web.

Seth Klarman Describes His Approach In Rare Harvard Interview

Seth KlarmanIn a rare interview with Harvard Business School that was published online earlier this month, (it has since been taken down) value investor Seth Klarman spoke at length about his investment process, philosophy and the changes value investors have had to overcome during the past decade. Klarman’s hedge fund, the Boston-based Baupost has one of Read More

If shared secrets and stolen credentials are such a problem, why are so many people still using usernames and passwords to protect their devices and accounts?

There are a few newer, more secure methods for securing devices and accounts. One of the most popular and user-friendly is biometric authentication, in which your fingerprints or face are used as a login in lieu of a password and username. There are a few reasons why this is more secure. First, while these authentication methods have been shown to be easy to fool, it requires close proximity to the device in question as well as the person who owns it. Second, it is simple enough that people can use it without fail, which is a hallmark of a good security option.

Asymmetric Cryptography To The Rescue

Other security options, like one time use passwords or password links or even voice calls to authenticate a user are only slightly more secure than password and username combos. They are difficult to use and can easily be intercepted and redirected, making them ineffective.

Authentication methods that don’t rely on shared secrets and that are easy for the user to employ are going to be the safest, and this is where asymmetric cryptography comes in. This type of authentication relies on a security certificate on the user’s device and that certificate is authenticated by a number of other factors including device geographical location, device security posture, IP address, and more.

Learn more about the security of different authentication methods from the infographic below.

Asymmetric Cryptography

Updated on

Jacob Wolinsky is the founder of ValueWalk.com, a popular value investing and hedge fund focused investment website. Jacob worked as an equity analyst first at a micro-cap focused private equity firm, followed by a stint at a smid cap focused research shop. Jacob lives with his wife and four kids in Passaic NJ. - Email: jacob(at)www.valuewalk.com - Twitter username: JacobWolinsky - Full Disclosure: I do not purchase any equities anymore to avoid even the appearance of a conflict of interest and because at times I may receive grey areas of insider information. I have a few existing holdings from years ago, but I have sold off most of the equities and now only purchase mutual funds and some ETFs. I also own a few grams of Gold and Silver
Previous article Business Round Table Must Help Ensure Free And Fair Elections
Next article Coronavirus stimulus checks: Pelosi on negotiations, we’re ‘just about there’

No posts to display