Redundancy on hardware power (Multiple power supplies/UPS's/generators), Disks (RAID), Traffic paths (Network design), HVAC, staff, HA (high availability)
SLA's – How much uptime do we want (99.9%?) – (ROI)
It is always easier to guess or steal passwords than it is to break the encryption, we have password policies to ensure they are as secure as possible, they should contain minimum length, upper/lower case letters, numbers, and symbols, they should not contain full words or other easy to guess phrases, they have an expiration date, password reuse policy and minimum use before users can change it again
Having passwords which are only valid once makes many potential attacks ineffective, just like one-time pads, they are widely implemented in online banking, where they are known as TANs (Transaction Authentication Numbers)
They contain a computer circuit using an ICC (Integrated Circuit Chip), Contact Cards - Inserted into a machine to be read, Contactless Cards - can be read by proximity, Magnetic Stripe Cards - Swiped through a reader, no circuit, very easy to duplicate
HOTP and TOTP can be either hardware or software based, cellphone software applications are more common now, HOTP (HMAC-based One-Time Password) - Shared secret and incremental counter, generate code when asked, valid till used, TOTP (Time-based One-Time Password) - Time based with shared secret, often generated every 30 or 60 seconds, synchronized clocks are critical
FRR (False rejection rate) Type 1 error - Authorized users are rejected, FAR (False accept rate) Type 2 error - Unauthorized user is granted access, CER (Crossover Error Rate) - Where FRR and FAR meet on the graph, this is where we want to be