Preview

Multi factor authentication

Powerful Essays
Open Document
Open Document
553 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multi factor authentication
The Business need for Security

Can multi factor authentication be breached?

Authentication:
Fundamental of information security is based on three principle Confidentiality, Integrity and Availability. How a user will be able to access asset by following these three principle is called as Access control. “Access control is the process of allowing only authorized users, programs and other computer system (i.e. networks) to observe, modify or otherwise take possession of resources of a computer system. It is also a mechanism for limiting the use of some resources to authorized users.”

The first step of granting access is authentication. Identification is the assertion of a unique identity for a person or system like user name, user id account number etc., whereas verifying some private information that only the user has access is called as authentication.

There are following factors which are generally used for authentication:
1. Authentication by knowledge (something a person knows)
2. Authentication by possession (something a person has)
3. Authentication by characteristics (something a person is)

Authentication by knowledge is generally implemented with user id and password combination. Authentication by possession is generally implemented by hardware or software tokens, onetime password etc. where as authentication by characteristics include biometric authentication such as fingerprint scan, retina scan, iris scan, handwriting pattern, voice etc. In recent years, a potential fourth factor has made an appearance on landscape: geolocation or somewhere you are.

Single factor authentication is generally implemented with use id and password combination. Two-factor authentication usually combination of two of the three mentioned types whereas three-factor authentication is combination of all three factors.

The general term for the use of more than one factor during authentication is multi factor authentication. Use of weak passwords has

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20 percent while the warehouse-shipping rate increased by 10 percent, and the overall profit has increased by a modest amount of 0.005 percent for the first reporting period.…

    • 1078 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    ____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users.…

    • 287 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    36. The two-factor authentication generally combines “something you have” and “something you know” or “something you have” and “something you are.”…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    3) Authentication: Verifying the identity of the person or device attempting to access the system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources?…

    • 503 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    It is a two different type of identification process. Like an ID card and a pin code.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    With the increasing desire also of private individuals to access their confidential data even from their mobile devices, the need for strong security controls for such application arises – in the same way as it has years ago in the area of web applications. This paper covers one of the most important parts thereof: the login process that allows an application on a mobile device accessing data from a server using two-factor authentication.…

    • 2311 Words
    • 10 Pages
    Powerful Essays

Related Topics