Types of authentication model
Authentication Factors
An authentication factor is a category of credentials used to authenticate or verify a user’s
identity. Authentication factors can include passwords, security tokens (like keys or smart
cards), and biometric verification such as fingerprint scans.
There are three main types:
1. Something You Know (Knowledge Factors)
• Verifies identity through confidential information, such as a login and password.
• Most common authentication factor.
• Can be forgotten or compromised.
2. Something You Have (Possession Factors)
• Verifies identity through a unique object, such as an access card or key fob.
• Removes the risk of forgetting passwords, but can be lost or stolen.
3. Something You Are (Inherence Factors)
• Verifies identity through inherent biometric characteristics, such as a fingerprint,
voice, or iris pattern.
• More secure than traditional factors, but can be expensive and less accurate.
Each factor has its advantages and disadvantages, and can be used alone or in combination
with others to provide strong authentication.
Types of authentication model
Single-factor authentication, multi-factor authentication, and continuous authentication
are three types of authentication models used in information security. Each type has its
advantages and disadvantages, and the choice of which one to use depends on the specific
security requirements of an organization.
1. Single-factor authentication
2. Multi-factor authentication
3. Continuous authentication
Single-Factor Authentication (SFA)
Single-factor authentication is a process for securing access to a given system, such as a
network or website, that identifies the party requesting access through only one category of
credentials. Single-factor authentication is a type of authentication that uses only one
factor to verify the identity of a user. This factor can be something the user knows (such as a
password or PIN), or something the user has (such as a smart card or token), or something
the user is (such as a fingerprint or face).
Although this is the most common and well-known form of authentication, it is considered
low-security and the Cybersecurity and Infrastructure Security Agency (CISA) recently added
it to its list of Bad Practices.
Example: A user logs into their online banking account using only their password.
Password-based authentication
PIN-based authentication
Smart card-based authentication
Real-world example: Many websites and applications use SFA, such as Facebook, Twitter,
and online banking systems.
Advantages
1. Easy to implement and manage
2. Low cost
3. Wide range of authentication methods available
Disadvantages
1. Vulnerable to password guessing and cracking attacks
2. Vulnerable to phishing and social engineering attacks
3. Limited security
Multi-Factor Authentication (MFA)
Multi-factor authentication (MFA) is a multi-step account login process that requires users
to enter more information than just a password. For example, along with the password, users
might be asked to enter a code sent to their email, answer a secret question, or scan a
fingerprint.
Multi-factor authentication is a type of authentication that uses two or more factors to verify
the identity of a user. These factors can be something the user knows (such as a password
or PIN), something the user has (such as a smart card or token), or something the user is
(such as a fingerprint or face).
Example: A user logs into their online banking account using a password (knowledge-based
authentication) and a one-time password (OTP) sent to their mobile phone (possession-
based authentication).
Password and smart card-based authentication
Password and biometric-based authentication (such as fingerprint or face recognition)
Smart card and biometric-based authentication
Real-world example: Many organizations use MFA to provide stronger security, such as
Google’s 2-Step Verification, Apple’s Two-Factor Authentication, and online banking
systems.
Advantages
1. Provides stronger security than SFA
2. Reduces the risk of password guessing and cracking attacks
3. Reduces the risk of phishing and social engineering attacks
Disadvantages
1. More complex to implement and manage than SFA
2. Higher cost than SFA
3. May require additional hardware or software
Two-factor and three-factor authentication are both considered multi-factor authentication.
Two-factor authentication: Two-factor authentication (2FA) adds a second layer of
protection to your access points. Instead of just one authentication factor, 2FA requires two
factors of authentication out of the three factors.
Three-factor authentication:
Three-factor authentication (3FA) requires identity-confirming credentials from three
separate authentication factors and adds a third layer of access protection to your accounts.
Continuous Authentication (CA)
Continuous authentication is a type of authentication that continuously verifies the identity
of a user throughout a session. It enhances security without compromising the user
experience.
Types of CA:
1. Behavioral biometrics: This type of authentication uses the user’s behavior, such as
keystroke recognition or mouse movement analysis.
2. Machine learning-based authentication: This type of authentication uses machine
learning algorithms to analyze the user’s behavior and device characteristics.
3. Environmental authentication: This type of authentication uses the user’s
environment, such as location or device environment.
Example: A user logs into their online banking account and the system continuously verifies
their identity throughout the session using behavioral biometrics, such as keystroke
recognition.
Real-world example: Many organizations use CA to provide stronger security, such as
Google’s Advanced Protection Program, Apple’s Face ID, and online banking systems.
Advantages
1. Provides stronger security than SFA and MFA
2. Reduces the risk of session hijacking and man-in-the-middle attacks
3. Provides real-time authentication and authorization
Disadvantages
1. More complex to implement and manage than SFA and MFA
2. Higher cost than SFA and MFA
3. May require additional hardware or software