O'Reilly logo

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java by David Coffin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security Considerations for Two-Factor Distribution Avenues

Two-factor authentication messages can be delivered to our application users via a variety of devices. We are going to consider delivering the messages by cell phone, pager, and e-mail. With each of those devices we have to consider the security implications. Our preference will be to send the two-factor code to a cell phone or a pager. Only if those fail will we want to send the code to an e-mail address.

Security Issues with Two-Factor Delivery to E-Mail

E-mail in and of itself is a fairly secure application. It is password protected and it is usually well managed. However, the data is usually not protected in transit by encryption, and it is extremely easy to impersonate an e-mail ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required