C H A P T E R  9

Two-Factor Authentication

What would life be like if there were no imposters, no charlatans, and no thieves? Sorry, that rhetorical question does not provide any security. Neither does putting on a set of rose-colored glasses and believing that we are secure just because we’ve implemented substantial security measures. We will always be susceptible to trickery and carelessness. The weakest link, even with upright associates, is always a person taking shortcuts. Social engineering and lack of attention to our computer security code of conduct (like, don’t write down your password, don’t share your password, use complex passwords, and change your password periodically) give thieves entrance to our most secure systems.

So, we ...

Get Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.