0% found this document useful (0 votes)
7 views

CLS Unit-1(III)

Authentication is the process of verifying a user's identity to control access to data and resources, crucial for network security. It operates by comparing user-provided credentials against a database of authorized users and employs various factors such as knowledge, possession, inherence, location, and time. Different types of authentication include Single-Factor Authentication (SFA), Two-Factor Authentication (2FA), Three-Factor Authentication, and Multi-Factor Authentication (MFA), each enhancing security through additional verification methods.

Uploaded by

aatulverma07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

CLS Unit-1(III)

Authentication is the process of verifying a user's identity to control access to data and resources, crucial for network security. It operates by comparing user-provided credentials against a database of authorized users and employs various factors such as knowledge, possession, inherence, location, and time. Different types of authentication include Single-Factor Authentication (SFA), Two-Factor Authentication (2FA), Three-Factor Authentication, and Multi-Factor Authentication (MFA), each enhancing security through additional verification methods.

Uploaded by

aatulverma07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Unit 1

Topic: Authentication service security

❖ What is Authentication?

Authentication is the procedure of recognizing someone's identity by assuring that the person is the
similar as what he/she is claiming for.
The server uses authentication when someone needs to access the data, and the server required to
understand who is accessing the data.
Authentication technology provides access control for systems by checking to see if a user's
credentials match the credentials in a database of authorized users.

❖ Need of Authentication?

Password related breaches are the leading cause of data loss. Authentication is important because it
enables organizations to keep their networks secure by permitting only authenticated users to access
their protected resources. Companies also use authentication to enable remote employees to
securely access their applications and networks.

❖ How does authentication work?

During authentication, credentials provided by the user are compared to those on file in a database
of authorized users. If the credentials entered match those on file and the authenticated entity is
authorized to use the resource, the user is granted access. User permissions determine which
resources the user gains access to and also any other access rights that are linked to the user.

Currently used authentication factors include the following:

● Knowledge factor: The knowledge factor, or something you know, may be any authentication
credentials that consist of information that the user possesses, including a personal identification
number (PIN), a username, a password or the answer to a secret question.
● Possession factor: The possession factor, or something you have, may be any credential based
on items that the user can own and carry with them, including ID cards, a token or one-time
password (OTP).
● Inherence factor: The inherence factor, or something you are, is typically based on some form
of biometric identification, including fingerprints or thumbprints, facial recognition, retina scan
or any other form of biometric data.
● Location factor: Where you are may be less specific, but the location factor is sometimes used as
an adjunct to the other factors. The location factor cannot usually stand on its own for
authentication, but it can supplement the other factors by providing a means of ruling out some
requests. For example, it can prevent an attacker located in a remote geographical area from
posing as a user who normally logs in only from their home or office in the organization's home
country.
● Time factor: Like the location factor, the time factor, or when you are authenticating. It is not
sufficient on its own. It may be used together with location. For example, if the user was last
authenticated at noon in the U.S., an attempt to authenticate from Asia one hour later would be
rejected based on the combination of time and location.

Despite being used as supplemental authentication factors, user location and current time by
themselves are not sufficient, without at least one of the first three factors, to authenticate a user.

❖ Types of authentication

1. SFA: The most common implementation of authentication is SFA, which requires a user ID and a
password for sign-on and access. However to increase security there is an increased use of 2FA and
even MFA, which requires users and customers to enter not only a user ID and password, but also
additional authentication information.

2. 2FA: This type of authentication adds an extra layer of protection as it requires the user to enter a
verification code received via text message on a preregistered mobile phone.

3. Three-factor authentication: This type of MFA uses three authentication factors -- usually, a
knowledge factor, combined with a possession factor, such as a security token, and an inherence
factor, such as a biometric.

4. MFA: This type of authentication can combine any number of authentication factors. This
combination makes employees prove they are who they claim to be and is incredibly effective in
protecting against attacks.

You might also like