CHAPTER 2: RISKS TO ONE-FACTOR AUTHENTICATION

Our solutions are also our problems

Depending on your level of computing technology experience, you may be more or less familiar with three major models in architecture:

1 Mainframe computing

2 Client–server computing

3 Cloud-mobile computing

Each of these models represents a fundamental shift in the way computing architects leverage resources (memory, storage, processing power, etc.) and how those resources are made available to end-users.

In mainframe computing, the resources were highly centralised, with perhaps a couple of large machines that would allow many users to access them and share resources. A client–server model, however, shifted much of the computing resources and effort down to individual ...

Get Two-Factor Authentication now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.