0% found this document useful (0 votes)
26 views4 pages

Types of Authentication

The document outlines three main types of authentication factors: knowledge factors (something you know), possession factors (something you have), and inherence factors (something you are), each with their own advantages and disadvantages. It also describes three authentication models: single-factor authentication (SFA), multi-factor authentication (MFA), and continuous authentication (CA), detailing their processes, examples, and security levels. Each model varies in complexity, cost, and security effectiveness, with MFA and CA providing stronger security than SFA.

Uploaded by

aaryanali5005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views4 pages

Types of Authentication

The document outlines three main types of authentication factors: knowledge factors (something you know), possession factors (something you have), and inherence factors (something you are), each with their own advantages and disadvantages. It also describes three authentication models: single-factor authentication (SFA), multi-factor authentication (MFA), and continuous authentication (CA), detailing their processes, examples, and security levels. Each model varies in complexity, cost, and security effectiveness, with MFA and CA providing stronger security than SFA.

Uploaded by

aaryanali5005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Types of authentication model

Authentication Factors

An authentication factor is a category of credentials used to authenticate or verify a user’s


identity. Authentication factors can include passwords, security tokens (like keys or smart
cards), and biometric verification such as fingerprint scans.

There are three main types:

1. Something You Know (Knowledge Factors)

• Verifies identity through confidential information, such as a login and password.


• Most common authentication factor.
• Can be forgotten or compromised.

2. Something You Have (Possession Factors)

• Verifies identity through a unique object, such as an access card or key fob.
• Removes the risk of forgetting passwords, but can be lost or stolen.

3. Something You Are (Inherence Factors)

• Verifies identity through inherent biometric characteristics, such as a fingerprint,


voice, or iris pattern.
• More secure than traditional factors, but can be expensive and less accurate.

Each factor has its advantages and disadvantages, and can be used alone or in combination
with others to provide strong authentication.

Types of authentication model

Single-factor authentication, multi-factor authentication, and continuous authentication


are three types of authentication models used in information security. Each type has its
advantages and disadvantages, and the choice of which one to use depends on the specific
security requirements of an organization.

1. Single-factor authentication
2. Multi-factor authentication
3. Continuous authentication
Single-Factor Authentication (SFA)
Single-factor authentication is a process for securing access to a given system, such as a
network or website, that identifies the party requesting access through only one category of
credentials. Single-factor authentication is a type of authentication that uses only one
factor to verify the identity of a user. This factor can be something the user knows (such as a
password or PIN), or something the user has (such as a smart card or token), or something
the user is (such as a fingerprint or face).

Although this is the most common and well-known form of authentication, it is considered
low-security and the Cybersecurity and Infrastructure Security Agency (CISA) recently added
it to its list of Bad Practices.

Example: A user logs into their online banking account using only their password.

Password-based authentication

PIN-based authentication

Smart card-based authentication

Real-world example: Many websites and applications use SFA, such as Facebook, Twitter,
and online banking systems.

Advantages

1. Easy to implement and manage


2. Low cost
3. Wide range of authentication methods available

Disadvantages

1. Vulnerable to password guessing and cracking attacks


2. Vulnerable to phishing and social engineering attacks
3. Limited security

Multi-Factor Authentication (MFA)


Multi-factor authentication (MFA) is a multi-step account login process that requires users
to enter more information than just a password. For example, along with the password, users
might be asked to enter a code sent to their email, answer a secret question, or scan a
fingerprint.
Multi-factor authentication is a type of authentication that uses two or more factors to verify
the identity of a user. These factors can be something the user knows (such as a password
or PIN), something the user has (such as a smart card or token), or something the user is
(such as a fingerprint or face).

Example: A user logs into their online banking account using a password (knowledge-based
authentication) and a one-time password (OTP) sent to their mobile phone (possession-
based authentication).

Password and smart card-based authentication

Password and biometric-based authentication (such as fingerprint or face recognition)

Smart card and biometric-based authentication

Real-world example: Many organizations use MFA to provide stronger security, such as
Google’s 2-Step Verification, Apple’s Two-Factor Authentication, and online banking
systems.

Advantages

1. Provides stronger security than SFA


2. Reduces the risk of password guessing and cracking attacks
3. Reduces the risk of phishing and social engineering attacks

Disadvantages

1. More complex to implement and manage than SFA


2. Higher cost than SFA
3. May require additional hardware or software

Two-factor and three-factor authentication are both considered multi-factor authentication.

Two-factor authentication: Two-factor authentication (2FA) adds a second layer of


protection to your access points. Instead of just one authentication factor, 2FA requires two
factors of authentication out of the three factors.

Three-factor authentication:

Three-factor authentication (3FA) requires identity-confirming credentials from three


separate authentication factors and adds a third layer of access protection to your accounts.
Continuous Authentication (CA)
Continuous authentication is a type of authentication that continuously verifies the identity
of a user throughout a session. It enhances security without compromising the user
experience.

Types of CA:

1. Behavioral biometrics: This type of authentication uses the user’s behavior, such as
keystroke recognition or mouse movement analysis.
2. Machine learning-based authentication: This type of authentication uses machine
learning algorithms to analyze the user’s behavior and device characteristics.
3. Environmental authentication: This type of authentication uses the user’s
environment, such as location or device environment.

Example: A user logs into their online banking account and the system continuously verifies
their identity throughout the session using behavioral biometrics, such as keystroke
recognition.

Real-world example: Many organizations use CA to provide stronger security, such as


Google’s Advanced Protection Program, Apple’s Face ID, and online banking systems.

Advantages

1. Provides stronger security than SFA and MFA


2. Reduces the risk of session hijacking and man-in-the-middle attacks
3. Provides real-time authentication and authorization

Disadvantages

1. More complex to implement and manage than SFA and MFA


2. Higher cost than SFA and MFA
3. May require additional hardware or software

You might also like