IBM Says That Multi-Tiered Security Is the Need of the Hour

Advertisement
By Gopal Sathe | Updated: 5 February 2018 10:49 IST
Highlights
  • Security requires a combination of passwords, biometrics, more
  • Multi-tiered security is more reliable than one layer of strong security
  • People are likely to be lax about security on social media

Security and privacy are both topics that have been gaining in importance of late, and it's a trend that makes sense as more of our lives migrate to the Internet. But getting people to use good passwords and follow strong security protocols remains a challenge. IBM - among other companies - has studied this problem and has worked on a report to figure out what the future of accessing identity online is going to be. Gadgets 360 chatted with Kartik Shahani, Integrated Security Leader IBM India and South Asia, to learn about the study.

"The study was to understand how data breaches happen, what is the unique way that people break and spoof identity?" Shahani explained. "The intent was to figure out, what IBM should do to be future-ready?"

Part of the problem isn't that there aren't enough security solutions at hand, he added, but rather that the correct use of security solutions is not taking place. "There is a whole bunch of technology to be used where appropriate, the way people will access information via the Web or mobile platform, and there are other technologies as well," he said. "These look at user based anomalies and give detailed response. Even the small things like the way you type and the speed at which you type or the way you move the mouse, is a form of multi-factor authentication that is not using biometrics."

Advertisement

According to the study carried out by IBM, security needs to rely on multilayered authentication options, rather than a single layer of security for all purposes. It adds that the security requirements for different kinds of data varies, and for this reason, a one size fits all approach - whether it's passwords, or biometrics, or any other form - is not going to work.

Advertisement

"There is a set of technologies used by people, depending on what you're accessing," said Shahani. "When the access is for financial transactions, companies and people are very careful about their IDs and passwords. When it comes to social media, it's a very different way of looking at it, where convenience is more important."

Advertisement

However, this in itself presents a cause for concern. Many popular services that house sensitive information, like delivery services, online shopping and dating apps, encourage users to log in using their social accounts. Therefore, if one of these social/ email accounts is compromised, there could be a domino effect on how many additional accounts may also fall into the attacker’s hands.

With biometrics, on the other hand, Shahani pointed out that the concern lies in privacy, and how that biometric data is collected and stored. Trusting organisations to keep biometric data secure varied greatly by industry, with banking leading as the most trusted, according to IBM. Forty-eight percent of people would trust a major financial institution the most with their biometric data, while only 15 percent would trust that data to major social media sites.

Advertisement

However, that doesn't necessarily lead to better security. "Security is all about multi-tiering. What slips through one tier may be caught by another tier, or another one," said Shahani. "Triaging is very very important in security. I don't think there is a silver bullet, so the trick to it is to try and have multiple layers of security triaged so it gets better and better at detection and response."

"Also, there isn't one technology vendor whose technology is used to do all things," he added. "Access control, Web interface, security could all be coming from different companies. So it's very difficult to say that it's completely covered at all places."

To that end, IBM suggests that risk based authentication is the correct approach to take for organisations. With risk-based authentication, the company explained, authentication attempts are automatically evaluated based on contextual data and behavioural cues determined by administrators. When risk scores are elevated, the system can prompt the user to prove that they are who they say they are via an additional factor, which could be a biometric or another mechanism of choice.

"So what happens is, depending on the criticality of the application, you will grade it and depending on that, you will do a step up authentication," Shahani explained. "You may just use a user-name and password, for the next level ask a question, next level biometric, and so on, adding complexity, to allow you to get access. When it comes to financial sites, people will use the highest level of authentication, for the simple public domain stuff, people will use only the basic stuff."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus 15R, OnePlus 15R Ace Edition Launch Today: All You Need to Know
  2. Xiaomi's HyperOS 3 Update Is Rolling Out to These Phones, Tablets
  3. Filmfare OTT Awards 2025: Check out Full List of Winners
  4. SBI YONO 2.0 Launch: State Bank of India Reportedly Targets 20 Crore Users
  5. Oppo Find X9 Ultra Battery Capacity Teased By Company Executive
  6. Realme 16 Pro to Launch With Urban Wild Design in These Four Colourways
  7. OpenAI Says ChatGPT Will Soon Become an Operating System
  8. Google Says It Will Discontinue Its Dark Web Reports Due to This Reason
  1. OnePlus 15R, OnePlus 15R Ace Edition Launching Today: Know Price in India, Features, Specs and More
  2. Astronomers Witness Longest-Lasting Gamma-Ray Burst in History, 8 Billion Light-Years Away
  3. Sub-Millimeter Robots Can Sense, Think, and Act Autonomously, New Study Finds
  4. Earth’s Atmosphere Has Been Leaking Onto the Moon for Billions of Years, Study Finds
  5. New Orbital Clues Reveal How Hot Jupiters Moved Close to Their Stars
  6. Heartiley Battery Out on OTT: Know Where to Watch This Tamil Sci-Fi Series Online
  7. Raat Akeli Hai: The Bansal Murders OTT Release Date: When and Where to Watch it Online?
  8. Private Satellites Pinpoint Methane Emissions from Oil, Gas, and Coal Facilities Worldwide
  9. Ishq Vishk Rebound Out on OTT: Know Where to Watch This Rohit Saraf Starrer Romcom
  10. Theeyavar Kulai Nadunga Now Streaming Online: Where to Watch This Dark Psychology Thriller
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.