How secure are one-time passwords!
POONAM MAYANI

In today’s world, where cybersecurity threats are becoming increasingly sophisticated and prevalent, many people are looking for ways to protect their online accounts from unauthorized access.
One popular method for enhancing security is the use of one-time passwords (OTPs). But the question remains: is a one-time password safe?
First, let’s define what a one-time password is!
An OTP is a temporary password that is generated for a single use and then becomes invalid. OTPs are typically sent to users via text message, email, or through an authenticator app on their smartphone.
The idea behind OTPs is that they provide an additional layer of security beyond a regular password, as even if a hacker gains access to a user’s password, they would still need the OTP to log in.
So, are OTPs safe?
The short answer is yes, OTPs are generally considered to be a secure method for protecting online accounts. They are widely used by financial institutions, government agencies, and other organizations that require high levels of security. OTPs provide an extra layer of protection against common types of cyber attacks, such as phishing and credential stuffing.
However, it’s important to note that OTPs are not foolproof. There have been instances where hackers have successfully intercepted OTPs and used them to gain unauthorized access to accounts. This is typically done through a technique known as SIM swapping, where a hacker convinces a mobile carrier to transfer a victim’s phone number to a device under their control.

One of the principal OTPs to raise a ruckus around town was a dongle with a random number generator (RNG). It showed a similar number as a principal gadget housed inside the organization’s server room. Sadly, these gadgets were costly.
A more affordable choice, particularly as innovation progressed, was for organizations to tackle the cell phones everybody was at that point hauling around, said Jack Poller, investigator at Big business Procedure Gathering, a division of TechTarget. OTPs then began to show up in various structures, the most widely recognized being passwords sent by means of SMS, email or call.
While their security was flawed, OTPs empowered organizations to overcome a significant confirmation issue: further develop security without adversely influencing UX. Expanding security prerequisites that present grinding could bring about loss of clients and business.
“We realize a few banks have intentionally not carried out MFA [multifactor authentication] on the grounds that they are more worried about client maintenance than extortion misfortunes,” said Subterranean insect Allan, investigator at Gartner.
Widespread OTP use is prevented, be that as it may, on the grounds that not every person approaches a similar innovation. “We actually see a requirement for equipment OTP tokens in light of the fact that not every person has a reasonable cell phone or will involve their own telephone for work,” Allan said. “An Eastern European bank had just 66% of clients with cell phones, and just half of those even had information plans.”
In a business setting, notwithstanding, bosses have more prominent command over workers and can mandate verification factors all the more effectively, yet the issues become cost and representative eagerness.

What sort of OTP innovation could an organization at any point bear? Buying equipment keys for every worker isn’t modest. And will representatives utilize their own gadgets for work? Many might recoil from introducing validation applications on their own gadgets.
And past expense and UX is the test of forestalling and guarding against OTP assaults.
To mitigate the risk of OTP interception, it’s recommended to use an authenticator app rather than relying solely on text messages or email. Authenticator apps generate OTPs locally on a user’s device, which makes them much harder to intercept.
In conclusion, while OTPs are not a perfect solution for online security, they are generally considered to be a safe and effective method for protecting online accounts. By using an authenticator app and being aware of the risks, users can help ensure that their accounts remain secure.
[Poonam Mayani is from Pune]
Images from different sources
Mahabahu.com is an Online Magazine with collection of premium Assamese and English articles and posts with cultural base and modern thinking. You can send your articles to editor@mahabahu.com / editor@mahabahoo.com ( For Assamese article, Unicode font is necessary)