New book examines two-factor authentication methods
ELY , UK, April 22, 2015 /EINPresswire.com/ -- Increased cybercrime and theft of personally identifiable information have led to a rise in the adoption of two-factor authentication (TFA or 2FA). TFA is mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards and PINs. But TFA’s adoption has risen beyond the financial sector.
Two-factor Authentication, a new book by IT Governance Publishing, provides a comprehensive evaluation of popular secondary authentication methods and presents international examples of standards and regulations that make two-factor authentication a component of security guidance.
The book also examines multi-factor authentication (MFA), two-step verification (2SV) and strong authentication. It discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT).
Two-factor Authentication is available from IT Governance in multiple formats (including softcover, Adobe eBook, Kindle and ePub):
www.itgovernance.co.uk/shop/p-1693.aspx (International)
www.itgovernanceusa.com/shop/p-1470.aspx (USA)
www.itgovernance.eu/p-1120.aspx (EU)
www.itgovernance.asia/p-1056.aspx (Asia-Pacific)
www.itgovernance.in/p-1056.aspx (India and South Asia)
www.itgovernancesa.co.za/p-1024.aspx (South Africa)
- Ends -
NOTES TO EDITORS:
IT Governance Ltd is the single-source provider of books, tools, training and consultancy for information security, IT governance, risk management and compliance. The company is a leading authority on cyber security and IT governance for business and the public sector. IT Governance is ‘non-geek’, approaching IT issues from a non-technology background and talking to management in its own language. The company’s customer base spans Europe, the Americas, the Middle East, South Africa and Asia. More information is available at: www.itgovernance.co.uk.
Two-factor Authentication, a new book by IT Governance Publishing, provides a comprehensive evaluation of popular secondary authentication methods and presents international examples of standards and regulations that make two-factor authentication a component of security guidance.
The book also examines multi-factor authentication (MFA), two-step verification (2SV) and strong authentication. It discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT).
Two-factor Authentication is available from IT Governance in multiple formats (including softcover, Adobe eBook, Kindle and ePub):
www.itgovernance.co.uk/shop/p-1693.aspx (International)
www.itgovernanceusa.com/shop/p-1470.aspx (USA)
www.itgovernance.eu/p-1120.aspx (EU)
www.itgovernance.asia/p-1056.aspx (Asia-Pacific)
www.itgovernance.in/p-1056.aspx (India and South Asia)
www.itgovernancesa.co.za/p-1024.aspx (South Africa)
- Ends -
NOTES TO EDITORS:
IT Governance Ltd is the single-source provider of books, tools, training and consultancy for information security, IT governance, risk management and compliance. The company is a leading authority on cyber security and IT governance for business and the public sector. IT Governance is ‘non-geek’, approaching IT issues from a non-technology background and talking to management in its own language. The company’s customer base spans Europe, the Americas, the Middle East, South Africa and Asia. More information is available at: www.itgovernance.co.uk.
Desi Aleksandrova
IT Governance
+44 (0) 845 070 1750
email us here
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.
