Live Now

IBM Says That Multi-Tiered Security Is the Need of the Hour

Advertisement
By Gopal Sathe | Updated: 5 February 2018 10:49 IST
Highlights
  • Security requires a combination of passwords, biometrics, more
  • Multi-tiered security is more reliable than one layer of strong security
  • People are likely to be lax about security on social media
IBM Says That Multi-Tiered Security Is the Need of the Hour

Security and privacy are both topics that have been gaining in importance of late, and it's a trend that makes sense as more of our lives migrate to the Internet. But getting people to use good passwords and follow strong security protocols remains a challenge. IBM - among other companies - has studied this problem and has worked on a report to figure out what the future of accessing identity online is going to be. Gadgets 360 chatted with Kartik Shahani, Integrated Security Leader IBM India and South Asia, to learn about the study.

"The study was to understand how data breaches happen, what is the unique way that people break and spoof identity?" Shahani explained. "The intent was to figure out, what IBM should do to be future-ready?"

Part of the problem isn't that there aren't enough security solutions at hand, he added, but rather that the correct use of security solutions is not taking place. "There is a whole bunch of technology to be used where appropriate, the way people will access information via the Web or mobile platform, and there are other technologies as well," he said. "These look at user based anomalies and give detailed response. Even the small things like the way you type and the speed at which you type or the way you move the mouse, is a form of multi-factor authentication that is not using biometrics."

According to the study carried out by IBM, security needs to rely on multilayered authentication options, rather than a single layer of security for all purposes. It adds that the security requirements for different kinds of data varies, and for this reason, a one size fits all approach - whether it's passwords, or biometrics, or any other form - is not going to work.

Advertisement

"There is a set of technologies used by people, depending on what you're accessing," said Shahani. "When the access is for financial transactions, companies and people are very careful about their IDs and passwords. When it comes to social media, it's a very different way of looking at it, where convenience is more important."

Advertisement

However, this in itself presents a cause for concern. Many popular services that house sensitive information, like delivery services, online shopping and dating apps, encourage users to log in using their social accounts. Therefore, if one of these social/ email accounts is compromised, there could be a domino effect on how many additional accounts may also fall into the attacker’s hands.

With biometrics, on the other hand, Shahani pointed out that the concern lies in privacy, and how that biometric data is collected and stored. Trusting organisations to keep biometric data secure varied greatly by industry, with banking leading as the most trusted, according to IBM. Forty-eight percent of people would trust a major financial institution the most with their biometric data, while only 15 percent would trust that data to major social media sites.

Advertisement

However, that doesn't necessarily lead to better security. "Security is all about multi-tiering. What slips through one tier may be caught by another tier, or another one," said Shahani. "Triaging is very very important in security. I don't think there is a silver bullet, so the trick to it is to try and have multiple layers of security triaged so it gets better and better at detection and response."

"Also, there isn't one technology vendor whose technology is used to do all things," he added. "Access control, Web interface, security could all be coming from different companies. So it's very difficult to say that it's completely covered at all places."

To that end, IBM suggests that risk based authentication is the correct approach to take for organisations. With risk-based authentication, the company explained, authentication attempts are automatically evaluated based on contextual data and behavioural cues determined by administrators. When risk scores are elevated, the system can prompt the user to prove that they are who they say they are via an additional factor, which could be a biometric or another mechanism of choice.

"So what happens is, depending on the criticality of the application, you will grade it and depending on that, you will do a step up authentication," Shahani explained. "You may just use a user-name and password, for the next level ask a question, next level biometric, and so on, adding complexity, to allow you to get access. When it comes to financial sites, people will use the highest level of authentication, for the simple public domain stuff, people will use only the basic stuff."

 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus Pad 3 With Snapdragon 8 Elite SoC to Launch Globally on This Date
  2. Google I/O 2025 LIVE: Google Smart Glasses Teased Ahead of Event
  3. Infinix Hot 60 Pro+ Tipped to Debut as the Slimmest Curved Screen Phone
  4. Nothing Phone 3 Confirmed to Launch Globally in July
  5. Intel Launches Arc Pro B-Series GPUs for AI Workloads at Computex 2025
  6. iQOO Neo 10 Pro+ With Snapdragon 8 Elite, 6,800mAh Battery Launched
  7. Qualcomm Will Unveil New Snapdragon Flagship SoC Earlier Than Usual
  8. Realme Partners With Aston Martin for Realme GT 7 Dream Edition
  1. iQOO Neo 10 Pro+ With Snapdragon 8 Elite, 6,800mAh Battery Launched: Price, Specifications
  2. MediaTek Showcases AI Strategy At Computex 2025, Unveils Hybrid Computing Solution
  3. Vi Postpaid International Roaming Plans Now Offer Double Data, Travel Security Benefits and More
  4. Redmi Pad 2 Renders Price Leaked; Said to Feature MediaTek Helio G100 Ultra Chip, 9,000mAh Battery
  5. Intel Arc Pro B-Series GPUs With XMX AI Cores and Advanced Ray Tracing Units Launched
  6. Microsoft NLWeb Open Project for AI-Powered Natural Language Interface for Websites Unveiled
  7. Zeb-Silencio 111 Headphones With 40mm Titanium Drivers, Up to 55 Hours Battery Life Launched in India
  8. Qualcomm's Snapdragon 8 Elite 2 SoC to Launch Earlier Than Expected
  9. Nothing Phone 3 Confirmed to Launch Globally in July
  10. Infinix XPad GT Launch Date Set for May 21; Confirmed to Arrive With 8 Speakers and 10,000mAh Battery
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.