Home page logo

pen-test logo Penetration Testing mailing list archives

Re: Hardware/software secureIDs - pros and cons.
From: "Carl-Johan Bostorp" <carl-johan.bostorp () hps se>
Date: Fri, 29 Jun 2007 09:37:44 +0200

What are the pros and cons for using hardware RSA SecureID/Other and
software with the same characteristics?

Main argument for using hardware: Security. There's no feasible way for
an attacker to get the seed value. If it's software, then compromised
machine => compromised seed value => attacker can login whenever he/she
choose to.

A con would be that the token can be forgotten or lost, whereas if it's
software then depending on where you have it (PC, cell phone) you'll
always have it available. If the device with the software crashes, you
can always just install it elsewhere and enter the seed value again.

I also believe the price favors the use of software.

Another option to discuss is whether it's perceived as easier by the
end-user with a physical token or a software installation. This might
depend on where the software is installed. If it's a browser toolbar and
you're logging on to a web site, then I guess that's pretty nice. But if
it's installed on a cell phone or PDA, a physical token would probably
be perceived as easier since the numbers are readily available without
any extra steps.

This List Sponsored by: Cenzic

Swap Out your SPI or Watchfire app sec solution for
Cenzic's robust, accurate risk assessment and management
solution FREE - limited Time Offer


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]