覚えられない! "パスワード難民"からの脱出は、次世代の生体認証技術がカギとなるAnd never in trouble and to not be quite login?
"******" Ttan! "User name or password is incorrect. Please try again." Ttan! Ttan! Thus, once again, to repeat again, or would not experience that was unsolved. SNS and shopping sites, such as online storage, it's input of ID and password that are required each time you use the Internet service. While convenient services is rich, not remember ID and password, will be some people that feel cumbersome often.Also said that the mainstay of when you have forgotten the password "secret question" is a quite difficult, though not also be bought, you can come out as "the name for the first time and kept pet?". And though was set is a yourself. It's to try to re-issue a password to give up, but not get issued so easily. Screen to enter the alphabet that was limp appears, further unsolved is waiting. The "Gunya character": for (CAPTCHA capture hereinafter) which is a distorted character computer not be identified, it seems intended to demonstrate the input by the hand of man. Any weak. This is whether it is a whether it is a "a", "d". And this is whether it is a whether it is a "n", "h". mcafee I was tired. The other, I'm fed up. "Password refugees" and much there is the word "password fatigue", he has been battered everyone of this world to the cumbersome password management. Seemed When it is good. I will quit anymore Internet. He has become me.
No use once the password is a bad why?
One of the reasons that become tired of password management, and that it is a "use once" is not good. Recently, a reminder message "immediately changed if you are using the same password and any other company service" has been issued one after another from the site management company. This is because the "incorrect login" is caused by turning use the same password you are frequently in a number of Internet service.
If the login information of ID · password Watare in the hands of someone, and it is possible that human beings with a malicious, impersonate the person that has the account. Account information of ID · password, once flows out once from somewhere in the company, also spill over to other services to "daisy chain". And what are called "Account List attack", the more users who are turning using the ID and password, the damage is extensive.
"Account takeover" and the monetary damage of myself tomorrow
So, I wonder is actually what damage occurs?
For example, if that was hijacked the SNS account of by unauthorized login, not only data, such as a telephone book or photo is withdrawn, posts and no remember to wear, and that is allowed to spread the induction to malicious sites, friends around and acquaintances might damage extends to. It was complicit in crime while you do not know, it could lead to such thing.
Such damage had been reported frequently as news so far. In 2014, becomes the account hijacking is topic of LINE, might finally be a lot of people who felt that "not a Taningoto". By fraud to buy the electronic money under the guise of friends, he monetary damage occurred frequently in fact. In addition, or stolen credit card information you have registered with the online shopping, it is now seen many cases that meet the monetary damage such or is remitted to another account online banking.
In this way, people who are turning to use the ID and password, the risk of being victimized by an unauthorized login I said that very high. And from there to the damage is slow. Even immediately, you should stop the use once the password.
Let's use the convenient password management tool with peace of mind
Humans are creatures to forget. "It is virtually impossible to store a plurality of complex passwords" - speak do this, Ogawa McAfee maker of security software such as "McAfee Ribusefu".
- Of course when it was Ogawa is a security expert, but it does not turn use password?
"To be honest, but I do not say 100% (laughs). I because there is also a service you do not have almost used in the old days registration. However, we are also to be possible change things of such a service."
- How do I manage the password?
"Password management tool is required. In a note to the sticky Some people are stuck on the PC, but habit not good to expose to the location where it is touched to the human eye. People you have notes such as Excel and Word You have also, because there is a possibility that the outflow, which is also not a safety. Use the security software and a total of password management tool, is ideal to be safely managed. The password itself, meaningless you can set the complicated interwoven such as upper and lower case, numbers in alphabetical string. McAfee ribs safe, because there is a password generation function of, it is useful if you use it. "And okay to trust the password management tool?
- The password management application that is available on the streets, I think all right even trust? In fact in the wrong application, it is anxiety and or not than information has been withdrawn.
"I can not say with such unauthorized application is not. If you put the security software, you will be alert in response to the safety of the app, but ultimately must yourself to determine the. Password management tools, we and security software companies such as, If you select the ones that are provided from a reliable company that has passed through the name is more secure. "
Feature called "" included in the McAfee Ribusefu "" Sefuki "is, it offers as a function that can store ID and password. Once you if you register, or later you will be able to log in without entering. Multi corresponds to the device, from any terminal that has put the software you will be able to securely log. You do not need to remember the other password "
- There is a function that can store ID in the browser and password. How do different from probably with it?
"The ease of use is almost the same as the function of the browser, safety is very different. For example, in many browsers of the number of users, such as Internet Explorer or Chrome, already floating around is what is called some password cracking tool. This is malicious it means that the people who have from being easily analysis have to pay the effort. for Sefuki are stored on the server of took firm of key McAfee (cloud), it can be said that it is more secure. "
To be that the two careful in management tools select. Whether one is, there is a support system that can be rest assured that even deposit the important information that password. Another, whether information is protected properly. Also in the browser's memory function, still Ichimatsunofuan remains to ....... If properly choose a reliable password management tool, it is released from the hassle and anxiety, and he can spend gently mind.
Unlocked at the "face path" or "spell". The next generation of biometric authentication technology? ?
Opens cave treasure has been hidden and chanting "Open Sesame!". This is one scene in "Ali Baba" Arabian Nights. Spell of scene of this story has become a reality. It is, storage services that lock is released by applying a voice to the terminal "personal locker". In the Arabian Nights, of course, but authentication is not, if if had this "authentication technology by voice", it might have been a completely different story.In the "McAfee Ribusefu", private photos and notes, is available important cloud storage features such as can be the store confidential documents "personal locker" is. In this personal locker, lock release function by biometric authentication is adopted. When you save the file in the storage, in addition to the 6-digit PIN code (number), and by adding the setting of face authentication and voice authentication, identification by three steps are taken, and to achieve high confidentiality I hear there.
- Face recognition and voice authentication of personal locker, What happens as each of accuracy?
"Face authentication, and Ali without glasses, are properly authenticated" different look "even. Audio, even if turned voice hoarse by tone of the throat has become to be able to determine that it is the voice of the person. When would loosely the criteria for this determination, because coming out is a possibility of misunderstanding that it is the person others, accuracy is doing the tuning while maintaining high "
- In terms of information security, that can be expected in the future of biometric authentication technology?
"Biometric technology is in part dependent on the performance of the terminal, depending on the type of biometric authentication, even though it is intended to be provided to all users like to help by being introduced into the various terminals and services future Consider and go thing. The face and voice, is a personal "information" you do not have other than himself. Therefore, then you are better to confidentiality in terms of security, you can remember the password, even less of a burden and such or input. There are both benefits "It is a biometric authentication, which is a still there are many problems, but towards the escape from the "Password refugees" of people, no doubt that it is a technology that has hidden a great potential. It is "personality" was given to human beings, such as the face and voice, and he becomes a personal "key" that combines the safety and convenience.
No comments:
Post a Comment