0% found this document useful (0 votes)
62 views

Multi-Factor Authentication - Assignment

This document discusses multi-factor authentication (MFA) as a security method. It explains that MFA requires users to provide multiple validations, such as a password and code from a token, to access protected resources. Using MFA provides advantages like making passwords more secure and allowing remote access while staying compliant with security standards. The document also states that identity theft is a serious issue for organizations and that MFA can help prevent cyber attacks.

Uploaded by

Rikky Abdul
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views

Multi-Factor Authentication - Assignment

This document discusses multi-factor authentication (MFA) as a security method. It explains that MFA requires users to provide multiple validations, such as a password and code from a token, to access protected resources. Using MFA provides advantages like making passwords more secure and allowing remote access while staying compliant with security standards. The document also states that identity theft is a serious issue for organizations and that MFA can help prevent cyber attacks.

Uploaded by

Rikky Abdul
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Running Head: MULTI-FACTOR AUTHENTICATION

MULTI-FACTOR AUTHENTICATION
MULTI-FACTOR AUTHENTICATION

Answer-1

The most popular and sensitive form of safety is awareness factors. Factors of knowledge are

less reliable so it is easier to exchange or hack information. Examples of what the individual

knows require authentication:

● Passcodes. - Passwords.

● Reference (or personal identification numbers).

● Answers to charges of secrecy

Answer-2

It is not a practical aim to stop all cyber violence, but easy precautions will significantly decrease

the probability of your being a future target. Whenever practicable, you can use MFA

particularly for confidential data such as your primary email address, your financial account, and

your health records. Although certain organisations need you to use MFA, there are those that

can provide it as an alternative tool but need to take the initiative to enable it.

Answer-3

The MFA aims to deliver a multi-faceted structure of security. This helps make sure the people

who use your device think they are. There are even more obstacles to the breaking, even though

an aspect is compromised (Shao, 2019). For instance, the robber would also need more than that

information if the computer password were to be robbed. For MFA, users need several types of

validity correctly combined. For eg a user may need to type a password and input a number from

a hard token for a protected program. Only the right password paired with the right hard token

number will allow a user entry.


MULTI-FACTOR AUTHENTICATION

Answer-4

Here, we will inform you of five advantages of multi-factor verification to speed you up on

another important safety pattern.

❏ Weak Passwords

❏ Allow Remote Access

❏ Stay Complaint

❏ Improve Security

❏ Multi-factor authentication actually makes login easier

Answer-5

Theft of individuality is an organization that is extremely damaging. In addition to the

considerable expense of compromising (Melki, 2020) concessions can also result in major harm

to reputations. Multi-factor authentication could be more than ever a tool for stopping cyber

attacks.
MULTI-FACTOR AUTHENTICATION

References
Melki, R., Noura, H. N., & Chehab, A. (2020). Lightweight multi-factor mutual authentication
protocol for IoT devices. International Journal of Information Security, 19(6), 679–694.
https://doi-org.nec.gmilcs.org/10.1007/s10207-019-00484-5
Shao, Z., Li, Z., Wu, P., Chen, L., & Zhang, X. (2019). Multi-factor combination authentication
using fuzzy graph domination model. Journal of Intelligent & Fuzzy Systems, 37(4), 4979–4985.
https://doi-org.nec.gmilcs.org/10.3233/JIFS-181859

You might also like