Multi-Factor Authentication - Assignment
Multi-Factor Authentication - Assignment
MULTI-FACTOR AUTHENTICATION
MULTI-FACTOR AUTHENTICATION
Answer-1
The most popular and sensitive form of safety is awareness factors. Factors of knowledge are
less reliable so it is easier to exchange or hack information. Examples of what the individual
● Passcodes. - Passwords.
Answer-2
It is not a practical aim to stop all cyber violence, but easy precautions will significantly decrease
the probability of your being a future target. Whenever practicable, you can use MFA
particularly for confidential data such as your primary email address, your financial account, and
your health records. Although certain organisations need you to use MFA, there are those that
can provide it as an alternative tool but need to take the initiative to enable it.
Answer-3
The MFA aims to deliver a multi-faceted structure of security. This helps make sure the people
who use your device think they are. There are even more obstacles to the breaking, even though
an aspect is compromised (Shao, 2019). For instance, the robber would also need more than that
information if the computer password were to be robbed. For MFA, users need several types of
validity correctly combined. For eg a user may need to type a password and input a number from
a hard token for a protected program. Only the right password paired with the right hard token
Answer-4
Here, we will inform you of five advantages of multi-factor verification to speed you up on
❏ Weak Passwords
❏ Stay Complaint
❏ Improve Security
Answer-5
considerable expense of compromising (Melki, 2020) concessions can also result in major harm
to reputations. Multi-factor authentication could be more than ever a tool for stopping cyber
attacks.
MULTI-FACTOR AUTHENTICATION
References
Melki, R., Noura, H. N., & Chehab, A. (2020). Lightweight multi-factor mutual authentication
protocol for IoT devices. International Journal of Information Security, 19(6), 679–694.
https://doi-org.nec.gmilcs.org/10.1007/s10207-019-00484-5
Shao, Z., Li, Z., Wu, P., Chen, L., & Zhang, X. (2019). Multi-factor combination authentication
using fuzzy graph domination model. Journal of Intelligent & Fuzzy Systems, 37(4), 4979–4985.
https://doi-org.nec.gmilcs.org/10.3233/JIFS-181859