0% found this document useful (0 votes)
23 views21 pages

Lec 5 Expanded Authentication Access Control

intro to computer

Uploaded by

shahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views21 pages

Lec 5 Expanded Authentication Access Control

intro to computer

Uploaded by

shahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Lecture 6,7: Authentication & Access

Control
• Understanding MFA, Biometrics, and Role-
Based Access Control (RBAC)
What is Authentication?
• Authentication is the process of verifying the
identity of users or systems.
Why is Authentication Important?
• 1. Prevents unauthorized access
• 2. Protects sensitive data
• 3. Ensures system security
Types of Authentication Factors
• 1. Something You Know (Passwords, PINs)
• 2. Something You Have (Smart Cards, OTPs)
• 3. Something You Are (Biometrics)
Single-Factor vs Multi-Factor Authentication

• Single-Factor: Uses only one authentication


method
• Multi-Factor: Combines two or more
authentication factors for increased security.
What is Multi-Factor Authentication (MFA)?

• MFA requires two or more independent


credentials to enhance security.
MFA Examples in Real Life
• 1. Password + OTP
• 2. Fingerprint + PIN
• 3. Smart Card + Facial Recognition
Benefits of MFA
• 1. Reduces risk of unauthorized access
• 2. Protects against phishing attacks
• 3. Enhances cybersecurity compliance
Challenges of Implementing MFA
• 1. User inconvenience
• 2. Compatibility issues
• 3. Cost of implementation
What are Biometrics?
• Biometrics use unique biological traits for
authentication.
Types of Biometric Authentication
• 1. Fingerprint Recognition
• 2. Facial Recognition
• 3. Iris Scanning
• 4. Voice Recognition
• 5. Behavioral Biometrics
Advantages of Biometric
Authentication
• 1. High security and reliability
• 2. Difficult to forge
• 3. Fast and convenient for users
Challenges of Biometric
Authentication
• 1. Privacy concerns
• 2. Risk of biometric data leaks
• 3. Spoofing and hacking risks
What is Role-Based Access Control
(RBAC)?
• RBAC restricts access based on predefined
roles within an organization.
How RBAC Works
• 1. Users are assigned roles
• 2. Each role has specific permissions
• 3. Access is granted based on roles, not
individuals
Benefits of RBAC
• 1. Simplifies access management
• 2. Enhances security by restricting access
• 3. Reduces administrative workload
Case Study: MFA in Banking
• How financial institutions use MFA to secure
online banking and prevent fraud.
Case Study: RBAC in Corporate
Environments
• Example: How a company restricts access to
financial data using RBAC policies.
Quiz & Discussion
• 1. What are the three main authentication
factors?
• 2. Why is MFA more secure than single-factor
authentication?
• 3. What challenges do biometrics present?
• 4. How does RBAC improve security?
Summary
• 1. MFA improves security with multiple
authentication factors
• 2. Biometrics provide strong authentication
• 3. RBAC ensures controlled and efficient
access management.
Final Thoughts
• Implementing strong authentication and
access control is critical for cybersecurity.

You might also like