Notification
From MgmtWiki
Revision as of 11:13, 22 September 2018 by Tom (talk | contribs) (Created page with "==Full Title or Meme== Several best practices and ==Context== The collection of User Private Information by a Data Controller now necessitates the ability Authenti...")
Full Title or Meme
Several best practices and
Context
The collection of User Private Information by a Data Controller now necessitates the ability Authenticate the User under a wide range of challenges, like:
- Simplest of all the User needs to Authenticate from time to time and on a variety of devices under less than ideal conditions where passwords are mistyped and Alternate Authentication factors are lost or fail.
- More severe Recovery problems occur when the User has lost control of their account and needs it to be reset. The level of Authentication for these situation can be severely taxing to a user desperate for access to their accounts.
- When an Authentication factor like an alternate email or phone number is compromised, insecure Recovery methods themselves become a means of attack, especially since factors like phone number were never intended to be secure.[1]
Problems
In [[]] the concepts of Security, Privacy and User Experience all collide and make any solution a compromise among competing tendencies.
Anti-Pattern
Solutions
References
- ↑ Lily Hay Newman, PHONE NUMBERS WERE NEVER MEANT AS ID. NOW WE’RE ALL AT RISK (2018-08-25) Wired Magazine https://www.wired.com/story/phone-numbers-indentification-authentication