Designing a Two-Factor Authentication (2FA) System in E-Commerce Applications
DOI:
https://doi.org/10.59141/jist.v6i1.8806Keywords:
system design, two-factor authentication (2fa), android applicationAbstract
The development of digital technology has given significant changes to human life, especially in the Internet world, the Internet makes it easier for humans to carry out daily activities and work. However, this convenience can also increase the threat of cybercrime. This research aims to implement a security system based on Two-Factor Authentication (2FA) with a One-Time Password (OTP) on Android applications, to protect data from cybercrimes such as Phishing data theft and ransomware. The research method used is the waterfall model, which contains system analysis discussing what is needed in building applications with 2FA and OTP security, system design discusses the system flow that will be applied and created, coding discusses how the backend can run the system flow created, and implementation discusses the application of previous results. The result of the research obtained is that the implementation of Two-Factor Authentication (2FA) using a One-Time Password (OTP) can improve the security of user data by providing an additional layer of security that reduces unauthorized access rights, this also provides a safer experience for application users who implement it.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Daffa Sholah Islamey, Joko Sutopo
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.