Multi-factor authentication. An extended overview
No Thumbnail Available
ICI Publishing House
This paper presents in a more detailed manner some of the techniques that can enforce the security of data by using a multi-factor authentication. Cyberattacks target vulnerable systems by exploiting their weak authentication procedures and the validation process. An additional method of authentication is supposed to help the users secure the access to their information by presenting something more than just a password. The most well-known factors are biometrics, cards and authentication applications. By adding more than one factor for authentication, the possibility of a security breach is diminished. Moreover, we discuss the importance of using a multi-factor authentication, as well as some advantages and some drawbacks for each of these methods.
security, multi-factor authentication, cyberattacks, password, biometrics, breach