Canon Marketing Japan Co., Ltd. ESET SPECIAL SITE Canon MJ Security Information for Safe Digital Utilization Cyber Security Information Bureau ESET?Understand how to set up two -stage authentication
What is "authentication" on the Internet?
In the Internet world, there are websites and services that anyone can access, while others provide services only for registered users.In the real world where you can face your opponent directly, you may be able to present and identify ID cards with face photos to identify individuals.However, in the Internet world where you can not see the opponent's face or where you are, you will not be able to show you directly.In such a cyber space, the mechanism for identifying individuals is "authentication" on the Internet.
A widespread and popular authentication method is a method of using a user ID and password.Set the user ID and password with any combination in advance, and identify the user by correctly entering this ID and password set when logging in to the system.Because it is a mechanism that identifies individuals based on information that is only in the user's head, if it is operated correctly, it can be accurately identified and the system construction is not complicated.
However, as has been pointed out before, there are many problems with authentication methods using user ID and password.For example, a simple password may be specified by the attacker, so you must set a complex password.In that case, it is difficult for users to remember the password in their heads, and it may leak from memos with passwords.
With the spread of smartphones (hereinafter referred to as smartphones), an environment has been established that can easily use convenient services such as SNS, online banking, and mobile payments.Against this background, the importance of authentication is increasing.Based on the issues that the password has, two -stage authentication is progressing to strengthen the authentication level and enhance safety.
How to configure two -step authentication with Google account
Google has been working on the introduction of two -stage certification from an early prominent service.Fearing that the user's privacy will be greatly infringed by being logged in to Google Accounts, Google provides two -stage certification and calls for aggressive use.Let's take a look at what procedures to set with Google's two -step authentication as an example.
1.Click the security from the menu displayed in the Google account settings.On the screen of "Login to Google" displayed as shown in FIG. 1, click the "two -step authentication process" in the red frame.
Figure 1: Google account security setting screen
2.As shown in Fig. 2, a explanation of the two -stage authentication is displayed. Click the "Try" button.The screen of Figure 3 is displayed continuously, so let's check if the device you usually use is displayed correctly.When you click "Display other options", an overview of the login method using "Security Key" or "Text message or voice call" is displayed.In addition, if the linked device is supported, a method of using the "authentication system application" will be guided.
Figure 2: Information screen of two -step authentication process
Figure 3: Devices used for authentication are displayed
3.When you click "Continue" on the screen in FIG. 3, the screen of FIG. 4 is displayed and the settings are completed.In the future, one -time code will be sent to the device displayed in Fig. 3 at the time of logging in.
Fig. 4: screen for completing two -step authentication settings
Other options that can be used in two -step authentication are as follows.
Security key
Purchase the "Titan Security Key" sold by Google or authenticate using FIDO -compatible security keys.Connect to the device with a USB connection for a personal computer, or a smartphone with NFC or Bluetooth.
Text message or voice call
Register the phone number and receive the code via SMS.You can also receive it by voice call.
Google authentication system app
Download the authentication app and generate a valid passcode for a certain period of time on the app.
In addition to these, you can also select a "advanced protection function program".In this case, while the authentication strength is improved, the burden on the user increases.Balance between safety, convenience, and availability is important for continuous use.In general, the security strength and the burden on the user are in trade -off, so it is necessary to select an appropriate method while taking into account the value of the information assets to be protected.
In this article, we introduced Google as an example and how to set up two -step authentication.Other than Google, not only famous services such as Facebook and Amazon, but also services that need to focus on privacy are increasing.When registering as a service, it is also a good idea to add two -step authentication to the judgment material.
Recognize that authentication by one -stage password is no longer safe
Passwords have long been a leading role in cyber space authentication means.One aspect is that the existence of authentication methods using password has supported the appearance of various services on the Internet.However, as the evolution of digital technology has become sophisticated and sophisticated, it is approaching the limit that it is operated by password -only means.It is no longer possible to log in unauthorized login by just authentication of password alone.
Therefore, the two -step certification introduced this time has spread.The functions that realize face authentication and fingerprint authentication recently installed on smartphones and personal computers will continue to accelerate this flow.In the world of certification, various improvements are still being made to increase its strength.As a user who uses services, it is required to acquire knowledge correctly and set the authentication properly.First of all, why not respond from Google's two -stage authentication?