SlideShare une entreprise Scribd logo
1  sur  12
Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF) Michael G. Kaishar, MSIA | CISSP | Security+ Sr. Information Security Architect & Consultant   A Master of Science Research Practicum Presentation Graduate School of Management University of Dallas Partial Fulfillment of the Requirements for the Master of Science Degree in Information Assurance   Saturday, March 27, 2010
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  2 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
MATERIALS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  3 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
ANALYSIS ,[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  4 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF) Figure 1 .  Illustration of remote connectivity process  Figure 2 .  VMWare Inc.  Illustration of where virtual machines reside in reference to the Dell Laptop Hardware Layer
VIDEO DEMONSTRATION 1 ,[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  5 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
VIDEO DEMONSTRATION 2 ,[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  6 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
VIDEO DEMONSTRATION 3 ,[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  7 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
RESULTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  8 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
CONCLUSIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  9 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
CONCLUSIONS ,[object Object],[object Object],[object Object],Saturday, March 27, 2010  Michael G. Kaishar  10 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
Questions? Saturday, March 27, 2010  Michael G. Kaishar  11 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
Thank You Saturday, March 27, 2010  Michael G. Kaishar  12 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)

Contenu connexe

En vedette

세바시 15분 힐링이 아니라 빌리빙이다 - 조벽 동국대학교 석좌교수
세바시 15분 힐링이 아니라 빌리빙이다 - 조벽 동국대학교 석좌교수세바시 15분 힐링이 아니라 빌리빙이다 - 조벽 동국대학교 석좌교수
세바시 15분 힐링이 아니라 빌리빙이다 - 조벽 동국대학교 석좌교수cbs15min
 
3. 생각의 탄생 생각도구 1 관찰
3. 생각의 탄생 생각도구 1 관찰3. 생각의 탄생 생각도구 1 관찰
3. 생각의 탄생 생각도구 1 관찰hansei university
 
5. 생각의 탄생 생각도구 3 추상화
5. 생각의 탄생 생각도구 3 추상화5. 생각의 탄생 생각도구 3 추상화
5. 생각의 탄생 생각도구 3 추상화hansei university
 
사업계획서 The intelligence
사업계획서 The intelligence사업계획서 The intelligence
사업계획서 The intelligenceShinae Jung
 
8. 생각의 탄생 생각도구 6 유추
8. 생각의 탄생 생각도구 6 유추8. 생각의 탄생 생각도구 6 유추
8. 생각의 탄생 생각도구 6 유추hansei university
 
9. 생각의 탄생 생각도구 7 몸으로 생각하기
9. 생각의 탄생 생각도구 7 몸으로 생각하기9. 생각의 탄생 생각도구 7 몸으로 생각하기
9. 생각의 탄생 생각도구 7 몸으로 생각하기hansei university
 
20131019 생각정리세미나-세션2-김경수-배포용
20131019 생각정리세미나-세션2-김경수-배포용20131019 생각정리세미나-세션2-김경수-배포용
20131019 생각정리세미나-세션2-김경수-배포용경수 김
 

En vedette (8)

세바시 15분 힐링이 아니라 빌리빙이다 - 조벽 동국대학교 석좌교수
세바시 15분 힐링이 아니라 빌리빙이다 - 조벽 동국대학교 석좌교수세바시 15분 힐링이 아니라 빌리빙이다 - 조벽 동국대학교 석좌교수
세바시 15분 힐링이 아니라 빌리빙이다 - 조벽 동국대학교 석좌교수
 
다중지능검사지
다중지능검사지다중지능검사지
다중지능검사지
 
3. 생각의 탄생 생각도구 1 관찰
3. 생각의 탄생 생각도구 1 관찰3. 생각의 탄생 생각도구 1 관찰
3. 생각의 탄생 생각도구 1 관찰
 
5. 생각의 탄생 생각도구 3 추상화
5. 생각의 탄생 생각도구 3 추상화5. 생각의 탄생 생각도구 3 추상화
5. 생각의 탄생 생각도구 3 추상화
 
사업계획서 The intelligence
사업계획서 The intelligence사업계획서 The intelligence
사업계획서 The intelligence
 
8. 생각의 탄생 생각도구 6 유추
8. 생각의 탄생 생각도구 6 유추8. 생각의 탄생 생각도구 6 유추
8. 생각의 탄생 생각도구 6 유추
 
9. 생각의 탄생 생각도구 7 몸으로 생각하기
9. 생각의 탄생 생각도구 7 몸으로 생각하기9. 생각의 탄생 생각도구 7 몸으로 생각하기
9. 생각의 탄생 생각도구 7 몸으로 생각하기
 
20131019 생각정리세미나-세션2-김경수-배포용
20131019 생각정리세미나-세션2-김경수-배포용20131019 생각정리세미나-세션2-김경수-배포용
20131019 생각정리세미나-세션2-김경수-배포용
 

Similaire à Implementing two factor authentication for remote access using phone factor

Delivering software - process and infrastructure
Delivering software - process and infrastructureDelivering software - process and infrastructure
Delivering software - process and infrastructureRune Sundling
 
bryan-j.-reinbolt-resume
bryan-j.-reinbolt-resumebryan-j.-reinbolt-resume
bryan-j.-reinbolt-resumeBryan Reinbolt
 
Dan Lewis 2014
Dan Lewis 2014Dan Lewis 2014
Dan Lewis 2014Dan Lewis
 
Forrester Research and LifeSize Webinar: 5 Easy Ways to Accelerate Your Vide...
Forrester Research and LifeSize Webinar:  5 Easy Ways to Accelerate Your Vide...Forrester Research and LifeSize Webinar:  5 Easy Ways to Accelerate Your Vide...
Forrester Research and LifeSize Webinar: 5 Easy Ways to Accelerate Your Vide...Lifesize
 
Mobile Test Automation with Big Data Analytics
Mobile Test Automation with Big Data AnalyticsMobile Test Automation with Big Data Analytics
Mobile Test Automation with Big Data AnalyticsTechWell
 
STS _ Test Leadership Forum 2015
STS _ Test Leadership Forum 2015STS _ Test Leadership Forum 2015
STS _ Test Leadership Forum 2015Hank Lydick
 
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...Nicolas Bortolotti
 
Windows7 First Wave Community Update
Windows7 First Wave Community UpdateWindows7 First Wave Community Update
Windows7 First Wave Community UpdateWouterJansen
 
Expert Days: The VP R&D Open Seminar: Project Management
Expert Days: The VP R&D Open Seminar: Project ManagementExpert Days: The VP R&D Open Seminar: Project Management
Expert Days: The VP R&D Open Seminar: Project ManagementMoshe Kaplan
 
Service Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowService Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowTechWell
 
How To Sell Into Insurance with Perfecto
How To Sell Into Insurance with PerfectoHow To Sell Into Insurance with Perfecto
How To Sell Into Insurance with PerfectoLizzy Guido (she/her)
 
Michael kammer resume_20200818
Michael kammer resume_20200818Michael kammer resume_20200818
Michael kammer resume_20200818Michael Kammer
 

Similaire à Implementing two factor authentication for remote access using phone factor (20)

Delivering software - process and infrastructure
Delivering software - process and infrastructureDelivering software - process and infrastructure
Delivering software - process and infrastructure
 
bryan-j.-reinbolt-resume
bryan-j.-reinbolt-resumebryan-j.-reinbolt-resume
bryan-j.-reinbolt-resume
 
Dan Lewis 2014
Dan Lewis 2014Dan Lewis 2014
Dan Lewis 2014
 
Butler
ButlerButler
Butler
 
Forrester Research and LifeSize Webinar: 5 Easy Ways to Accelerate Your Vide...
Forrester Research and LifeSize Webinar:  5 Easy Ways to Accelerate Your Vide...Forrester Research and LifeSize Webinar:  5 Easy Ways to Accelerate Your Vide...
Forrester Research and LifeSize Webinar: 5 Easy Ways to Accelerate Your Vide...
 
Mobile Test Automation with Big Data Analytics
Mobile Test Automation with Big Data AnalyticsMobile Test Automation with Big Data Analytics
Mobile Test Automation with Big Data Analytics
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
 
STS _ Test Leadership Forum 2015
STS _ Test Leadership Forum 2015STS _ Test Leadership Forum 2015
STS _ Test Leadership Forum 2015
 
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
El siguiente paso para aplicaciones exitosas, aplicando cloud, tensorflow y f...
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Siva_resume
Siva_resumeSiva_resume
Siva_resume
 
Windows7 First Wave Community Update
Windows7 First Wave Community UpdateWindows7 First Wave Community Update
Windows7 First Wave Community Update
 
Expert Days: The VP R&D Open Seminar: Project Management
Expert Days: The VP R&D Open Seminar: Project ManagementExpert Days: The VP R&D Open Seminar: Project Management
Expert Days: The VP R&D Open Seminar: Project Management
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 
Service Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and HowService Virtualization: What, Who, When, and How
Service Virtualization: What, Who, When, and How
 
How To Sell Into Insurance with Perfecto
How To Sell Into Insurance with PerfectoHow To Sell Into Insurance with Perfecto
How To Sell Into Insurance with Perfecto
 
resume 10.27.14
resume 10.27.14resume 10.27.14
resume 10.27.14
 
Security In The Cloud Timed
Security In The Cloud TimedSecurity In The Cloud Timed
Security In The Cloud Timed
 
Madhu_Resume
Madhu_ResumeMadhu_Resume
Madhu_Resume
 
Michael kammer resume_20200818
Michael kammer resume_20200818Michael kammer resume_20200818
Michael kammer resume_20200818
 

Dernier

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 

Dernier (20)

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

Implementing two factor authentication for remote access using phone factor

  • 1. Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF) Michael G. Kaishar, MSIA | CISSP | Security+ Sr. Information Security Architect & Consultant   A Master of Science Research Practicum Presentation Graduate School of Management University of Dallas Partial Fulfillment of the Requirements for the Master of Science Degree in Information Assurance   Saturday, March 27, 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Questions? Saturday, March 27, 2010 Michael G. Kaishar 11 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)
  • 12. Thank You Saturday, March 27, 2010 Michael G. Kaishar 12 Implementing Two-Factor Authentication for Remote Access using PhoneFactor A Proof-of-Concept Experiment for an Accountancy Firm (AF)