Author Box
Articles Categories
All Categories
Articles Resources

Amazon Protects Against Fraud With Multi-Factor Authentication

January 26, 2012 | Comments: 0 | Views: 128 has not only become the largest online bookstore, but is also a multinational ecommerce company. The company has been spreading its reach like branches of a river while supplying goods to countries across the world. started off by profiting from being an online book brokering system and later offering many products. grew its business through online associates in the form of users.

When scaling a company by having users contributing to both ends of business, buying and selling, fraudulent and malicious activities become inevitable. Amazon did not become one of the largest ecommerce websites in the world by lacking in security though. In 2009, Amazon started to offer multi-factor authentication to protect its users against fraud. They now offer free identification through any mobile device or computer which can run a Time-Based One-Time Password application. They also offer paid multi-factor authentication through a third party proprietary authentication token from Gemalto which is supposed to offer higher security.

Free Amazon Multi-Factor Authentication

If you are able to run a time-based one-time password application on your smart phone, tablet or computer you can utilize the free AWS MFA process. Using this method, when you log into your account with your traditional username and password, a token will be delivered to the application. The token is a one-time password that is generated from an out-of-band network separate from the user's login network which reduces the chances of man in the middle attacks and makes the authentication process more secure.

Gemalto Multi-Factor Authentication

To increase security even further, Amazon's users may pay for service through Gemalto which offers a keyfob device for authentication. Amazon states Gemalto's third part proprietary token device offers better security than the free process. After the RSA hard token breaches, many people are skeptical about the proprietary OTP token's security.

Secure Cloud Computing

Amazon, like many companies, is run on a cloud of servers which allows remote access of data to many users at once. and its cloud network offer financial information to its publishers so they can track their earnings. A publisher's user account could display earnings and options for payment to the user. This is one of the reasons why the need for authentication security using a multi-factor process was necessary.

One of the most secure forms of protection for any company storing data on the cloud is by using an out-of-band, multi-factor authentication process which Amazon has implemented. This is especially true for ecommerce websites which may be storing financial data and personal information belonging to thousands of users. This added layer of security could be the very reason why the multinational electronic commerce corporation has not been present on recent data breach lists.

2011 was the year of data breaches and more companies are becoming like Amazon and are starting to utilize cloud computing. Will these companies follow suit to provide better protection and privacy to their users that are accessing information on the cloud or will there be a bigger data breach list containing more corporations in 2012? Companies utilizing the cloud to store and access information need to add additional layers of security to protect the information and the best way for them to do that is to utilize multi factor authentication.

Adam is a network security professional who believes out-of-band authentication is the most secure form of two factor authentication utilizing a one-time password. He writes to inform businesses about upcoming changes to government regulatory compliance and remote access security.

Source: EzineArticles
Was this Helpful ?

Rate this Article

Article Tags:

Amazon Multi Factor Authentication




One Time Password


Cloud Computing


Network Security

Thus, you can apply for the negligence compensation under such circumstances in order to recover your loss, Negligence Claims, Negligence compensation Involvedness of Negligence Claims. The court

By: Simon Liva l Legal > Personal Injury l December 13, 2012 lViews: 292

If a lawyer is not able to devote enough time to your case then your defense is likely to suffer. Moreover specialization in one stream or other of defense is important so that the attorney can

By: Simon Liva l Legal > Criminal Law l December 12, 2012 lViews: 429

Filing a business bankruptcy can be a complex and critical task, but you have several options. You can consult your bankruptcy attorney to know which among those options is right for you.This is a

By: Harvard McIntosh l Legal > Corporations LLC l December 11, 2012 lViews: 235

You can always check for the treatments that are covered. This is because there are some policies which do not give you claims if you meet any kind of head injury.You can always check for the

By: Simon Liva l Legal > Personal Injury l November 05, 2012 lViews: 241

In Colorado, you have many Personal Injury Lawyers to choose from. When you choose the Law Offices of Andrew C. Bubb you instantly put years of experience and legal know how in your corner. Attorney

By: Dilshad l Legal > Personal Injury l October 25, 2012 lViews: 389

If you have been charged with a crime, speak with Boulder criminal defense attorney Steven Louth immediately to protect your rights. Steven Louth is a criminal defense attorney and criminal trial

By: Dilshad l Legal > Personal Injury l October 18, 2012 lViews: 244

The apparatus after analyzing the credit card creates a photostat copy that criminals use to drain your bank account dry. There are a couple of methods they can accomplish skimming.

By: Daryl Campbelll Legal > Identity Theftl April 24, 2012 lViews: 167

Discussion on Cressey's Fraud Triangle. Looking at the first leg of the fraud triangle which is unsharable financial need or more commonly referred to as perceived pressure.

By: Thomas R Kaiserl Legal > Identity Theftl April 18, 2012 lViews: 260

These types of database break ins make nationwide news but the local media is full of reports of identity fraud just about every day. They demonstrate a few pretty troublesome realities.

By: Daryl Campbelll Legal > Identity Theftl April 18, 2012 lViews: 124

Due to the increased number of incidents involving identity theft in the last ten years, new tactics are being employed to counter this for both business and residential paper shredding is fast

By: Alex Gaslangl Legal > Identity Theftl April 15, 2012 lViews: 146

There's plenty of information going around with regards to this crime which includes a number of myths. If you are not careful can have you moving in the wrong direction.

By: Daryl Campbelll Legal > Identity Theftl April 02, 2012 lViews: 145

What's that famous line in all the spy movies where the CIA agent reminds another character as events occur and conflicts arise; "Trust No One!" Well, my friends judging by how social networking is

By: Lance Winslowl Legal > Identity Theftl March 30, 2012 lViews: 150

The Federal Financial Institutions Examinations Council's (FFIEC) guidance for financial institutions, which was first issued in 2005, supports the use of strong authentication processes to protect

By: Adam Quartl Legal > Regulatory Compliancel January 05, 2012 lViews: 123

Although the Health Insurance Portability and Accountability Act was created in 1996 it was not always meant to secure the privacy of electronic health records. Originally HIPAA was created for paper

By: Adam Quartl Legal > Regulatory Compliancel January 03, 2012 lViews: 155