Interpersonal Multi-Factor Authentication (IMFA)
Rhian Peterson
USF Cybersecurity Student ????| Sec+ | Net+ | CySA+ |CSAP | CCST Cybersecurity | Empowering people to make informed security decisions
The cyber threat landscape evolves every single day, resembling a relentless cat-and-mouse game between attackers and defenders. With the increased usage of AI/ML enabling highly sophisticated attacks, the security of data, people, and resources is threatened. In response to this issue, I've devised a concept called Interpersonal Multi-Factor Authentication (IMFA) or Person to Person Authentication (P2P-A).
Two-Factor Authentication (2FA), a subset of Multi-factor Authentication (MFA) which is commonly used as a means to authenticate into a application helps to prevent various attacks that pose a threat application security. However, highly sophisticated social engineering attacks are emerging that exploit human vulnerabilities. To counter these threats, IMFA/P2P-A adds an additional layer of security through direct person-to-person verification, ensuring a robust defense against evolving cyber threats.
Objective: Implement MFA for accessing resources within different teams by requiring a person-to-person authentication step.
Setup and Requirements
Teams and Departments:
Scenarios:
Implementation Steps
Step 1: Define Keywords/Numbers
Step 2: Secure Communication Channel
Establish a secure communication channel for team members to verify identity (e.g., a secure chat app, encrypted email, or in-person verification).
Step 3: Access Request Process
Step 4: MFA Verification
Example Scenario:
1. Define Keywords/Numbers:
2. Request Access:
3. Verification:
4. Share Keyword/Number:
5. Access Resource:
Special Scenario (Company-wide Keyword)
The following is a prompt engineered scenario results contained from chatgpt:
Sample Scenario: Deepfake Attack and the Use of Company Keyword
Background:
The company, TechSecure, has implemented Interpersonal Multi-Factor Authentication (IMFA) with unique keywords for each department. Additionally, there is one company-wide keyword that is kept highly confidential and is used in situations where verification is highly uncertain or involves highly sensitive information.
Departments and Keywords:
Scenario: Deepfake Attack during a Crisis
领英推荐
Situation:
An intruder has managed to access a critical video conference meeting using deepfake technology to impersonate the CEO, Alex. The intruder’s goal is to gain access to sensitive resources from the Development team.
Steps:
1. Initiate the Meeting:
2. Request Verification:
3. Deepfake Detection and Response:
4. Confirm Identity:
5. Share Company-Wide Keyword:
6. Access System:
7. Post-Incident Review:
Conclusion
This scenario highlights the importance of having robust multi-factor authentication methods, including out-of-band verification, to counter sophisticated threats like deepfakes. It also emphasizes the need for a high-trust emergency protocol to ensure that even senior executives' identities can be verified securely.
Documentation and Training
Create Guidelines:
Training:
Testing and Feedback
Pilot Testing:
Rollout and Monitor
Full Rollout:
Tools and Technologies
Secure Communication Tools:
Access Control Systems:
By following these steps, you can create a robust proof of concept for in-person multi-factor authentication between teams, enhancing security and ensuring proper access control within your organization.