1. ▹ Antivirus
  2. ▹ Assets
  3. ▹ Authentication
  4. ▹ Availability
  5. ▹ Basic criteria for risk analysis
  6. ▹ Computer Hacks
  7. ▹ Confidentiality
  8. ▹ Control
  9. ▹ Cryptography
  10. ▹ Cybercrime
  11. ▹ Cybercriminals
  12. ▹ DRP – Disaster Recovery Plan
  13. ▹ Data backups
  14. ▹ Data loss
  15. ▹ Defacement
  16. ▹ Disinfect machine with a live CD
  17. ▹ Disposal
  18. ▹ Email
  19. ▹ Firewall
  20. ▹ Human error
  21. ▹ IDS/IPS
  22. ▹ Image rights
  23. ▹ Impact
  24. ▹ Integrity
  25. ▹ Internet and copyright
  26. ▹ Legal Aspects
  27. ▹ LuxTrust
  28. ▹ Malicious Codes
  29. ▹ Malicious websites
  30. ▹ Network segmentation
  31. ▹ Password
  32. ▹ Patches
  33. ▹ Phishing
  34. ▹ Physical faults
  35. ▹ Securing a fixed workstation
  36. ▹ Physical theft
  37. ▹ Recommendations for securing a file server
  38. ▹ Recommendations to secure a server connected to Internet
  39. ▹ Recommendations to secure a Web server
  40. ▹ Removable devices
  41. ▹ Risk processing
  42. ▹ Spam – unwanted emails
  43. ▹ SSL/TLS – encryption technologies on the web
  44. ▹ Update softwares with Secunia PSI
  45. ▹ Security Charter
  46. ▹ Social engineering
  47. ▹ Threat
  48. ▹ Virtual Private Networks (VPNs)
  49. ▹ Vulnerabilities
  50. ▹ Web of Trust - WOT
  51. ▹ Web filter – Proxy
  52. ▹ Why is it important to protect your computer?


In brief

Our society is largely based on the innate ability of humans to recognise their fellow humans. Humans have a highly evolved identification system with multiple factors such as appearance, voice, manner of speech, posture, etc.

This human skill is something that is sorely lacking in computers. Although automated facial recognition systems do exist, they are far from perfect. The “shared secret” – the password – remains the predominant authentication factor for a computer. However, machine authentication factors are still far removed from our natural ability to recognise people and they are often, therefore, the weak link in information security. Indeed, people still do not take authentication seriously. Rather, most of us consider it to be a necessary evil. But this is often the only protection that users have against the fraudulent use of their online identity.

#Authentication factors Authentication on a computer is performed in different ways, classified here according to 4 factors:

Authentication using something you know

This is usually a password or pin code. The advantage of this identification method is its simplicity and familiarity for most people. However, it has many disadvantages:

  • A password can easily be copied without the knowledge of the legitimate user. A user’s password can be stolen, for example, in a ‘malicious codes’ or ‘phishing’ attack; saving them on a website without SSL security; or by the mere fact that someone looks over your shoulder and notes your password when you log in (‘shoulder surfing’).
  • Many people use passwords that can easily be guessed by others, as shown by a study conducted following the exfiltration of passwords from
  • Many people use the same password for different applications. If a hacker manages to compromise one of these applications using your password, he will probably try the same password to infiltrate other applications.

Authentication by something you own

This authentication method generally uses a key providing physical access to the computer, a cryptographic card kept in a wallet or a ‘TAN’ type card.

The level of security used for this identification method depends on how easy it is to make copies of the tool in question.

It is for example very easy to copy a TAN card (by photo, by photocopier); it is also easy to duplicate a key.

However, it is impossible to make a copy of a ‘LuxTrust’ card. The advantages of this authentication system are:

  • the certainty that the card cannot be reproduced
  • three incorrect authentication attempts block the card
  • if it is lost, the card can be cancelled and will not work anymore, even if the thief has the PIN code

Authentication by something that you are

This involves fingerprint authentication or recognition by the layout of the veins of your hand or the image of your retina.

Authentication by something you know how to do

This most often involves the user copying a distorted word (the well-known “captcha” fields, where you are asked to copy a word for example). This identification method makes it possible to differentiate humans from computers, but not human beings from one another, because most human skills are shared by large groups of the population and identification would not be unambiguous.

Multi-factor authentication

Multi-factor authentication means the use of at least two of the first three authentication factors. It goes without saying that the more forms of authentication used, the greater the level of information access security.

It should not be forgotten that the more an online asset or service attracts the interest of hackers, the more effort they will put into getting it. This is why online services are secured at different levels. The ideal access security would obviously be always to use multi-factor authentication. Unfortunately, the cost of implementation, the accessibility of technology and the constant developments in security solutions mean that this behaviour is not yet a reality for users. Few people have a fingerprint reader and even fewer are willing to carry it when they travel. Hence, the most common form of authentication is the password, i.e. where the user shares secret information with the computer that the computer is able to identify.

Security policy

Draft and enforce the following sectoral policies:

Table of Contents