Google Authenticator As An Information System
Google Authenticator As An Information System
Functionality
People
◆ User - The process begins with a single user who has a Google account.
Technology
◆ Mobile Device - The user must have a mobile device with Google Authenticator
downloaded. This requires the device to have an app store with Google
Authenticator, a phone system that supports it, and sufficient storage. It is useful
for the Authenticator to be easily located. Google Authenticator should be open
on this device.
◆ Internet - To log in to the user’s Google Account, they must have an Internet
connection.
◆ Secondary Device - For users setting up their Google Authenticator for the first
time, they must have a secondary device to scan the QR code in the future.
◆ QR Code - The scanning of the QR code is the method required to sync the
user’s account to the Google Authenticator.
Information
◆ User Credentials - This information is the user’s username and password
associated with their Google Account. This is the primary information that is
foundational to setting up the authenticator.
◆ Security Instructions - The user must follow the security settings instructions in
order to enable their mobile device for two-factor authentication, which requires a
code to be texted to their phone number. After this, the user can select Google
Authenticator as their primary method for two-factor authentication.
◆ 6 Digit Code - This is the information generated by the Google Authenticator. It is
used as a secondary factor in account authorization for log in.
Search
Benefits
1. Added layer of security
2. Lessens risk of data breaching
3. Reduced risk of fraud
4. Centralized location and accessibility
5. No cost
There are several benefits that Google Authenticator provides. Firstly, as an application
that allows users to add a second factor of authentication to their accounts, Google
Authenticator provides users with an additional layer of security to all of their accounts. Next,
Authenticator effectively reduces the risk of data breaching. Behind online accounts are an
abundance of personal information, from credit card numbers, to personal emails, to banking
and tax statements, which are all at stake. Since a two-factor verification process is required for
log in, valuable data therefore has greater protection from hackers, who must break through an
additional wall in order to gain access. Also, the risk of fraud is reduced; aside from a user’s
account username and password, the hacker must also have a user’s physical phone, and the
ability to unlock it. The Google Authenticator additionally has many benefits pertaining to user
accessibility. All the 6-digit verification codes are stored in one central location and are available
without needing to be online. This could come in handy in situations where users lack cell
service, like on airplanes or in remote locations. Lastly, Google Authenticator can be
downloaded and utilized at no cost. It is easily accessible and provides protection for users’
accounts for free.
Harms
1. Difficult to set up
2. Time-consuming
3. Loss of account access
4. False sense of security
5. Defenseless against phishing
Although there are multiple benefits to using Google Authenticator, there are still a
number of harms that may arise with the use of the app. First off, the Authenticator is quite
difficult to set up, which could potentially discourage users from taking initiative in setting up the
application and reaping in its benefits. In addition, the two-step verification process could be
seen as a nuisance for many, due to the increased time and patience required to unlock
phones, to open the Authenticator for the 6-digit verification code, and to type the code in with
every log in. Moreover, when users acquire new or different phones, they must sync their
accounts to the Authenticator all over again, another time-consuming process. Next, the user
could lose access to their account and be unable to log in for prolonged or indefinite periods of
time. In the case that their mobile device runs out of battery, gets damaged or stolen, or the
Google Authenticator app simply faces functional issues, the user would no longer have access
to their accounts. Additionally, users may be more likely to be filled with a false sense of security
due to increased confidence in the protection of their accounts. This false sense of security
could lead users to being less careful when creating passwords and might even perpetuate the
habitual creation of weak pins or repeated passwords. The truth is that user accounts will never
be 100% secure; a second factor of authentication is only capable of lowering the risk of
compromise. Finally, the Google Authenticator is practically useless in the case that a user
encounters a phishing site. For example, if a user receives a phishing message prompting them
to log into their credit card account, the user would be redirected to a “fake” website made to
look like the actual credit card website: a “phishing” site. The phishing site would take the user
through the typical log-in processes, with the user logging into their “account” like normal and
entering their Authenticator code. Without even realizing it, the user would have already given
away their credentials. Phishing sites thus pose a harm, since Google Authenticator has no way
to control or prevent phishing.
Automation
Policies
Amplification
California Consumer Privacy Act (CCPA). (2020, February 10). Retrieved from
https://oag.ca.gov/privacy/ccpa
Nadeau, M. (2019, May 29). What is the GDPR, its requirements and facts? Retrieved from
https://www.csoonline.com/article/3202771/general-data-protection-regulation-gdpr-
requirements-deadlines-and-facts.html