7 - Design and Multifactor Security For ATM
7 - Design and Multifactor Security For ATM
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
OMOTOSHO, O. A.
Department of Information Technology, National Open University of Nigeria, Osogbo Study Centre.
AROYEHUN, A. A.
Department of Computer Science. Adeleke University, Ede. Nigeria. [email protected]
OGUNWALE, Y. E.
Department of Computer Science, University of Ilesa, Ilesa, Osun State. Nigeria. [email protected]
LALA, O. G.
Department of Computer Science. Adeleke University, Ede. Nigeria.
ONAMADE, O. A
Department of Computer Science. Adeleke University, Ede. Nigeria.
Abstract
Consumers, banks, and other financial organisations have suffered enormous financial losses as a result
of Automated Teller Machine Cybercrime. Passwords, Personal Identification Number (PINs), and card-
based authentication have all been shown to be unachievable in safeguarding Automated Teller Machine
(ATM) users from cybercrime. As a result, Multifactor Authentication (MFA) has been marketed to ATM
users as a more secure authentication method. This article investigates how MFA could be used to
effectively combat ATM cybercrime. According to the article, the multifactor authentication system is
designed to create a robust defense against common ATM security threats, including card skimming, PIN
theft, and card cloning. It argues that MFA significantly enhances the security of ATM transactions,
reducing the likelihood of financial losses for both financial institutions and their customers. The end
objective of this research is to design and implement a multifactor authentication system for ATMs,
incorporating multiple layers of security to ensure that only authorized users can access their accounts
and perform transactions. The system would combine something the user knows (e.g., a PIN) and
something the user is e.g., biometric data (fingerprint and facial recognition) to create a robust
authentication process. The implementation of a multifactor authentication in ATMs is a proactive
measure to curb ATM-related fraud and bolster overall security in the banking sector. By mitigating
vulnerabilities and enhancing authentication processes, this research contributes to a safer and more
secure ATM environment, instilling confidence in users and financial institutions alike.
Information Technology Act (Chaubey, 2020). using an Automated Teller Machine system.
Automated Teller Machines (ATMs) have Therefore, it is necessary to develop robust
revolutionized the banking industry by providing systems that can curb cybercrime in the banking
convenient access to financial services. system.
However, with the advancement of technology,
ATM cybercrime has become a significant Automated Teller Machine
concern for both financial institutions and
customers. Criminals employ various The Automated Teller Machine (ATM) is a
techniques, such as skimming, card trapping, revolutionary technology that has transformed
and cash-out attacks, to compromise ATMs and the way individuals conduct banking
steal sensitive information or money. To combat transactions. ATM was introduced in the
these threats, implementing effective security 1960’s, it has become an indispensable part of
measures is crucial. Multifactor authentication modern banking, offering convenient and round-
(MFA) has emerged as a powerful tool in the-clock access to a wide range of financial
mitigating ATM cybercrime, offering an services (Wikipedia).
additional layer of security beyond traditional
methods. In 1959, the first Automated Teller Machine was
introduced in Kingsdale Shopping Center Ohio,
Multifactor authentication (MFA) has emerged Canada. ATMs function as self-service kiosks
as a robust solution to enhance ATM security that provide customers with access to various
and combat cybercrime effectively. MFA banking services without the need for direct
requires users to provide multiple factors to interaction with a bank teller (Freedman, 2019).
verify their identity, making it significantly more To initiate a transaction, customers insert their
challenging for criminals to gain unauthorized ATM card into the machine and enter their
access or manipulate ATM transactions. By unique PIN. The ATM then communicates with
combining factors from different categories, the bank's computer system to authenticate the
such as knowledge, possession, and inherence, user and process the requested transaction. Upon
MFA strengthens the security of the successful verification, customers can choose
authentication process and provides an from a menu of services, withdraw cash, or
additional layer of protection against cyber perform other banking operations.
threats.
According to Johnson M. (2020), Automated
The problem addressed in this research is the Teller Machines (ATM) was introduced into the
need for effective security measures to curb Nigerian market in 1989, as a matter of fact, the
ATM cybercrime. Single-factor (PIN) very first ATM in Nigeria was installed by
authentication methods have demonstrated National Cash Registers (NCR) for the defunct
vulnerabilities, leading to an increase in Societe Generale Bank Nigeria (SGBN) in 1989.
fraudulent activities targeting ATMs. Financial
institutions face the challenge of protecting Automated Teller Machines (ATM) give
customer information, preventing unauthorized valuable payback to the banks and the
access, and maintaining the integrity of ATM customers. The ATMs allow bank customers to
transactions in the face of evolving cyber threats. withdraw cash conveniently anytime and
The purpose of embarking on this research work anywhere other than actual bank location by
is the need to curb the rising threat of cybercrime automating few of banking transaction services.
The customers also get real time help on other
96
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
services like balance enquiry, short statement, hidden cameras or keypad overlays to record
application for cheque book, e-cash transfer to PINs entered by unsuspecting ATM users.
other account, and more to customers. This c) Cash Trapping: Cash trapping involves
ATM interacts with a card called ATM card. installing a device inside or near the cash
Initially this card used to interact with ATMs dispenser slot to prevent cash from being
only but nowadays the card can use to purchase dispensed properly. Criminals retrieve the
online, make payments for services etc (Adesina, trapped cash later.
2019). d) Jackpotting: Jackpotting involves infecting
an ATM with malicious software or using
ATM Cybercrime physical tools to manipulate the ATM's
hardware, enabling unauthorized access to
Automated Teller Machines (ATMs) have the cash-dispensing mechanism. This allows
revolutionized banking services, providing criminals to make the machine dispense all
customers with convenient access to their of its cash.
accounts for various financial transactions. e) Network Attacks: Criminals may target the
However, the widespread adoption of ATMs has communication network infrastructure of
also attracted the attention of cybercriminals, ATMs to intercept sensitive data, manipulate
leading to an increase in ATM-related transactions, or gain unauthorized access to
cybercrime. This elaborate write-up explores the the ATM system.
various types of ATM cybercrime, the tactics f) Malware Attacks: Malware can be used to
used by criminals, the impact on individuals and infect an ATM's operating system or
financial institutions, and the strategies network, allowing criminals to gain control
employed to mitigate these threats (Wall, 2018). over the machine, extract sensitive data, or
perform unauthorized transactions.
Using a report on global ATM frauds conducted Sophisticated malware is designed to target
in 2019, ATM attacks and frauds can be ATMs, allowing criminals to manipulate
categorized into the following: cash dispensing, gather sensitive data, or
compromise network security.
a) Skimming: skimming involves stealing
g) Logical Attacks: Criminals exploit
information off a credit card during a
vulnerabilities in an ATM's software or
legitimate transaction. This type of scheme
operating system to bypass security controls
usually occurs in a business where the
and gain unauthorized access to the system
patron’s credit card is taken out of sight
(Global ATM frauds conducted in 2019).
while the transaction is being processed. The
fraudster will swipe the card through an ATM cybercriminals are highly sophisticated,
electronic device known as skimming employing various tactics to evade detection and
device, which records all information maximize their profits. They may use
contained on the magnetic strip. anonymous cryptocurrencies to launder money,
b) PIN Theft: PIN theft methods include employ social engineering techniques to gain
installing hidden cameras near ATMs to access to ATM locations, or remotely control
capture PIN entry or using overlay devices malware-infected ATMs from a distance. These
on the ATM keypad to record keystrokes. criminals also take advantage of vulnerabilities
The stolen PINs are then used in conjunction in outdated ATM software and security
with skimmed card data. Criminals employ protocols (Kanwal, 2018).
97
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
According to Von Graevenitize, (2020), he The client/server approach method was used to
discussed biometric verification in connection create the security feature that will improve the
with payment systems and ATMs and put out a ATM. The customer's identification data,
verification framework that, in order to increase accounts, and records in the bank's (server)
convenience, will replace the combination of records will all be connected. The network is
ATM cards and PINs with just biometrics. He built to accommodate a huge number of users,
suggested a system where an infrared scanner and dedicated servers are used to make this
goes through a database of fingerprints to verify possible. Because it offers sufficient protection
and approve entries. When the fingerprint layout for the resources needed for a crucial application
matches those in the database, access is granted like banking, the client/server model was chosen
for the transaction; otherwise, access is denied. for this application. Similar to this, a descriptive
Because using biometrics as your sole method of conceptual approach is adapted, including tools
verification is unsafe, PINs were removed from from the Unified Modeling Language (UML),
this framework, which has the drawback of just such as use case models, activity diagram and
offering one factor authentication for security class diagrams to represent how the user (bank
reasons. customers) interacts with the proposed system.
In order to establish a database and store
In a paper titled "Enhanced ATM Security cardholder data, Microsoft Access is used as a
System Using Biometrics," (Oko and Oruh, database creation tool. The project is carried out
98
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
using the software Visual Basic 6.0, which is case is an interaction between users and a
used to design the user interfaces and/or system; it captures the goal of the users and the
cardholder interaction with the ATM Machine. responsibility of the system to its users. It
describes the uses of the system and shows the
courses of events that can be performed as well
Unified Modeling Language Representation as defining what happens in a system. In
of ATM essence, the use case model tries to
systematically identify uses of the system and
The Unified Modeling Language (UML) is used therefore the system’s responsibilities. The Use
to represent the structure and behaviour of an Case Diagram provides a high-level overview of
Automated Teller Machine (ATM). The UML is the interactions between the primary actors
a graphical language for visualizing, specifying, (Customer and Bank) and the various use cases
constructing, and documenting the artifacts of a in the ATM system. One of the primary actors
software-intensive system. Some of the Unified that will interacts with the ATM is the user
Modeling Language that will be used to (customer). The customer can perform several
represent an Automated Teller Machine are Use use cases, including inserting a card,
Case Diagram, Class Diagram and Activity withdrawing cash, depositing money, checking
Diagram. their balance, changing their PIN, and ejecting
the card. Another primary actor in the system is
Use Case Diagram the bank. The bank will interact with the ATM
to authorize transactions and update the ATM
A Use Case Diagram for an Automated Teller
software. The diagram below (fig 3.1) shows the
Machine (ATM) will identify the primary actors
Use Case description
and the various use cases in the system. A use
Biometric
Approval Verification
Process
Withdraw
Insert card
Transfer
99
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
Enter PIN
Select transaction
Perform transaction
Other transactions
Bank System
ATM CARD +bank name -string
+Card No -long int +bank details -string
+bank name -string +user details -string
+expiry date -date +validation ()
+get account () +amount validation ()
+send details ()
Customer
+customer name -string ATM Machine
+address -string +card no -long int Transaction
+phone number -string +pin - int +customer details -string
+card number – long int +location -string +Date -date
+insert card () +bank name -string +amount -int
+enter pin () +read card () +status -boolean
+fingerprint () +validation () +connecting Bank ()
+facial I.D +userinput () +get Balance ()
+Select account type () +process Transaction () +get Status ()
+Enter amount () +give cash ()
+transfer amount () +generate Receipt ()
+withdraw cash ()
Fig. 3:3 Class Diagram
101
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
System Implementation, Testing and admin module was tested for enrolling and
Simulation registering new customers. The administrator
module for adding new clients and changing
The prototype was tested in relation to the two current ones is depicted. To improve security, a
modules that were built for the application user name and password are needed to log in as an
frontend, under the activities that the two actors in administrator. If these are entered incorrectly,
the use case design may perform. The customer access is blocked.
module was tested for authentication, while the
102
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
The Multifactor Authentication System was At the registration page, a form will be given to
implemented using MySQL, a relational database the customer which will contain their account
management system to generate the database and name, account number and phone number. Also,
Visual Studio was used as the compiler. the customer will also thumbprint and facial
verification will be captured.
The application is divided into two:
This is the application that is used to enter the
(i) The registration application user’s credentials into the database. In this
module, the customer’s first and last names are
(ii) The main application inputted into the database, along with the user’s
phone number and their email.
The Registration Application
The diagram below (fig. 4.1) illustrates the form to fill for the registration page.
Enter customer details
103
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
104
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
Enter your PIN Interface on a specific bank account. At this interface, there
is a display of a numeric keypad on the
This is the second interface on the ATM machine. touchscreen, allowing users to enter their PIN
This interface prompts the customer to enter their securely. It will show an input field to obscure the
PIN. The Personal Identification Number (PIN) entered PIN for privacy (e.g., "●●●●"). There is
entry interface on an ATM is a critical element also a “Proceed” button, to move to the next
for security. It is designed with a focus on user stage. There is also a provision of “Cancel”
privacy and ease of use. To access and manage button, in case the users want to cancel the PIN
your bank account, you must enter a Personal entry process and return to the main menu. Figure
Identification Number (PIN). The PIN acts as a 4.5 below shows the design of “Enter your PIN
security precaution to ensure that only those with Interface” of an Automated Teller Machine.
the proper authorization can conduct transactions
105
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
106
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
money from their account. “Transfer” button for Identification Number (PIN). “Cancel” button
the users to transfer money from their account to also allow users to cancel the transaction and
another person’s account. Also, “Balance return to the main menu. The display of the
Inquiry” button to check the account balance. The transaction page depends on the type of Bank
“Bill payment” button to pay bills or utilities. ATM, the choices may change. Figure 4.6 below
“Change Pin” button to update the Personal depicts this behavior.
107
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
Transfer Page Interface other banks. The users will just enter the account
number of the receiver, select the bank and enter
The "Transfer Page" interface in an Automated the amount and click on proceed, after this the
Teller Machine is where users can initiate fund account name and the amount to transfer will
transfers between accounts. This interface is prompt out to confirm. Then, the user will click
intuitive, secure, and user-friendly to ensure a on Yes to proceed. Press “Cancel” button to
smooth transaction. In this interface, the users are terminate the transaction and return to the main
allowed to transfer money from their accounts to menu. The interface is shown in fig. 4.10 below:
another account either with the same bank or
108
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
Balance Enquiry Page Interface This is the interface that allows the users to check
their account balance. The page is used to
The "Balance Inquiry" interface in an Automated determine the amount of money the customer has
Teller Machine is where users can check the in their accounts. The interface also includes the
balance of their accounts. It designed for ease of “Cancel” button to terminate the transaction and
use, adhering to security and accessibility return to the main menu. The Balance Enquiry
standards to ensure a positive user experience. page interface is shown in fig. 4.11 below:
Conclusion References
Adeoti, J.O., (2021). Automated Teller Machine Corsetti, E., Montanari, A., and Ratto, E. (2021).
(ATM) Frauds in Nigeria: The Way Out. Dealing with different time granularities in
Journal of Social Sciences, 27(1), 53–58. formal specifications of real-time systems.
Journal of Real-Time Systems, 3(2), 191–
Adeoye O. S. (2020) Evaluating the Performance 215. doi:10.1007/BF00365335
of Two-Factor Authentication Solution in
The Banking Sector. International Journal Erhabor, I. M., 2018 “Cybercrime and the
of Computer Science, Issues (IJCSI), 9(2), youths,” Department of Education,
1694-0814. Ambrose Alli University, Ekpoma,
Nigeria, 2018, PGDE Project.
Adesuyi, F.A. et al., (2019). A survey of ATM
security implementation within the Gao J., J. Cai, K. Patel, and S. Shim: (2019).
Nigerian banking environment. Journal of Wireless Payment, Proceedings of the
Internet Banking and Commerce, 18(1). Second International Conference on
Embedded Software and Systems
Adewumi, S., (2018). An Ideal ATM (ICESS05), China, 367-374.
Implementation in an Unsecured
Environment. In Proceedings of the Gaurav A., Sharma A., Gelara V., and Moona R
International Conference on Software (2018). “Using Personal Electronic Device
Engineering and Intelligent Systems. 1–8. for Authentication-Based Service Access”.
5930–5934. ICC‟08, IEEE International
Amurthy, P.K. & Redddy M, (2019). Conference.
Implementation of ATM Security by Using
Fingerprint recognition and GSM. Hassan, A. B. Lass F. D. and Makinde J. (2018)
International Journal of Electronics Cybercrime in Nigeria: Causes, Effects
Communication and Computer and the Way Out, ARPN Journal of
Engineering, 3(1), 83–86. Science and Technology, 2(7), 626 – 631.
ATM crime: Overview of the European situation Henricks, A., & Kettani, H. (2019). On data
and golden rules on how to avoid it, protection using multi-factor
European Network and Information authentication. Proceedings of the
Security Agency, Aug. 2019, Technical International Conference on Information
Report. System and System Management (ISSM),
Rabat, Morocco. New York, NY: ACM.
ATM of Banks: Fair Pricing and Enhanced https://doi.org/10.1145/3394788.3394789
Access - Draft Approach Paper, Reserve
bank of India, Technical report, 2018. Hoare, C. A. R. (2018). Communicating
sequential processes. Upper Saddle River,
Cornelis Robat, “ATM (Automatic Teller NJ: Prentice-Hall.
Machine)”, The History of Computing
110
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
Kanwal S., N.A. Zafar, (2018). Formal model of Lasisi, H and Ajisafe, A.A., (2018).
automatic teller machine system using "Development of stripe biometric based
Znotation, International conference on fingerprint authentications systems in
Emerging technologies (ICET), Automated Teller Machines," Advances in
Islamabad,131–136. Computational Tools for Engineering
Applications (ACTEA), 2018 2nd
Khatmode Ranjit, P. et al., (2020). ARM7 Based International Conference, 172(175), 12-15.
Smart ATM Access & Security System
Using Fingerprint Recognition & GSM Longe O. B. and S. C. Chiemeke (2018).
Technology. International Journal of “Cybercrime and Criminality in Nigeria:
Emerging Technology and Advanced what roles is Internet Access Points
Engineering, 4(2), 856–860.
111
INTERNATIONAL ACADEMIC JOURNAL OF MULTI-DISCIPLINARY
STUDIES (IAJMS)
A PUBLICATION OF THE
INSTITUTE OF BUSINESS RE-ENGINEERING, INNOVATION AND STRATEGY (IBRIS)
Volume 2. Issue 2. December, 2023 Edition
Playing?” European Journal of Social Tetlay, A., Treharne, H., Ascroft, T., &
Sciences, 6(4), 132–139. Moschoyiannis, S. (2020). Lessons learnt
from a 2FA roll out within a higher
Mali P., Salunke S., R. Mane and P. Khatavkar P, education organisation.
(2018)."Multilevel ATM Security Based https://arxiv.org/pdf/2011.02901.pdf
on Two Factor Biometrics." International
Journal of Engineering Research & Von Graevenitz, A., (2019). Biometric
Technology. 1( 8), 1-6. authentication in relation to payment
systems and ATMs. DuD -Datenschutz
Mandal, S.,( 2018). A Review on Secured Money und Datensicherheit, 31(9), .681–683.
Transaction with Fingerprint Technique in
ATM System. IJCSN - International Wall, D. (2018). What are Cybercrimes?
Journal of Computer Science and Network, Criminal Justice Matters, 58(1), 20-21.
02(04), 08–11.
Wall, D.S. (2019). The Internet as a Conduit for
Oko, S. & Oruh, J., (2019). Enhanced atm Criminal Activity. In A. Pattavina (Ed.),
security system using biometrics. IJCSI Information technology and the criminal
International Journal of Computer justice system (pp. 77-98). Thousand Oaks,
Science, 9(5), 352–357. CA: Sage. Vol. No,
Onyesolu, M.O. & Ezeani, I.M., (2018). ATM Wang, Y. (2018). On contemporary denotational
Security Using Fingerprint Biometric mathematics for computational
Identifier: An Investigative Study. intelligence. Transactions of
International Journal of Advanced Computational Science, 2, 6–29.
Computer Science and Applications doi:10.1007/978-3-540-87563-5_2
(IJACSA), 3(4),.68–72.
Wang, Y. (2019). Software engineering
Padmapriya, V. & Prakasam, S., (2018). foundations: A software science
Enhancing ATM Security using perspective. In CRC series in software
Fingerprint and GSM Technology. engineering (Vol. II). Boca Raton, FL:
International Journal of Computer Auerbach Publications.
Applications, 80(16), .43–46.
Wang, Y. (2020). Using process algebra to
Pandey K., M. Masoom, S. Kumari and P. describe human and software system
Dhiman, (2021). "ATM Transaction behaviors. Brain and Mind,4(2), 199–213.
Security Using Fingerprint/OTP." Journal doi:10.1023/A:1025457612549
of Emerging Technologies and Innovative
Research, 2(3), 448-453. Yeboah-Boateng, E. O., & Kwabena-Adade, G.
D. (2020). Remote access communications
Schneier, B. (2005). Two-factor authentication: security: Analysis of user authentication
Too little, too late. Communications of the roles in organizations. Journal of
ACM, 48(4), 136. Information Security, 11(3), 161-175.
112