0% found this document useful (0 votes)
5 views

CS - Authentication Service Security

Cyber security

Uploaded by

khushiyadav88400
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

CS - Authentication Service Security

Cyber security

Uploaded by

khushiyadav88400
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Authentication Service Security

Authentication: Authentication is the process of verifying the identity of a user or system attempting to access a
resource or service. It ensures that the user or system is who or what it claims to be before allowing access.
Authentication is a fundamental aspect of security in both physical and digital contexts.
Key Concepts:
 Identity: The unique identifier of the entity seeking access (e.g., username, digital certificate).
 Credential: Information used to authenticate the identity, such as passwords, PINs, biometric data, smart cards,
etc.
 Verification: The process of confirming that the provided credentials match the stored or expected values.

Types of Authentication Systems:


1. Single-factor authentication (SFA) is a method of verifying a user's identity using only one type of credential. This is
the simplest form of authentication, typically relying on something the user knows, such as a password or PIN.
(Think of entering your house using just a key. You only need one factor (the key) to unlock the door and gain access to
your home.)

Key Concepts:
 Credential: The piece of information used to verify identity (e.g., a password).
 Authentication: The process of verifying the user's identity using the provided credential.

How Single-Factor Authentication Works – Example:


 Scenario: Logging into an Email Account
 User Attempts to Log In:
 You want to access your email account.
 You go to the email login page.
 Entering Credentials:
 You enter your email address (username) and your password.
 Credential Verification:
 The email service checks the entered password against the one stored in its database for your account.
 Access Granted:
 If the password matches, you are granted access to your email account.
 If the password does not match, access is denied, and you may be asked to try again.

Example Workflow:
 You go to the email login page.
 You enter your email address and password.
 The email service verifies the password.
 If the password is correct, you gain access to your email account.
 If the password is incorrect, access is denied.

Benefits of Single-Factor Authentication:


 Simplicity: Easy to implement and use.
 Speed: Quick authentication process, as it requires only one credential.

Drawbacks of Single-Factor Authentication:


 Security Risks: If the password is weak or compromised, unauthorized users can easily gain access.
 Susceptibility to Attacks: Vulnerable to various attacks such as phishing, brute force, and social engineering.
2.Two-factor authentication (2FA): is a security process that requires two different forms of identification to verify a
user's identity. This adds an extra layer of security compared to single-factor authentication. The two factors typically
include something the user knows (like a password) and something the user has (like a smartphone or a hardware
token).
(Think of entering a secure building. You need your ID card (something you have) to swipe at the entrance and then
enter a PIN code (something you know) to gain access.)
Key Concepts:
 Something You Know: A password or PIN.
 Something You Have: A physical device, such as a smartphone, hardware token, or a smart card.

How Two-Factor Authentication Works – Example:


 Scenario: Logging into an Online Bank Account
 User Attempts to Log In:
 You want to access your online bank account.
 You go to the bank's login page.
 Entering Credentials (First Factor):
 You enter your username and password.
 Verification of First Factor:
 The bank verifies the entered password against the one stored in its database.
 If the password is correct, the bank proceeds to the second factor.
 Prompt for Second Factor:
 The bank sends a one-time verification code to your registered smartphone via SMS, email, or an authenticator
app.
 Entering Second Factor:
 You receive the code on your smart phone and enter it on the bank’s website.
 Verification of Second Factor:
 The bank verifies the code you entered.
 Access Granted:
 If the code is correct, you gain access to your bank account.
 If the code is incorrect, access is denied.

Example Workflow:
 You go to the bank's login page.
 You enter your username and password.
 The bank verifies your password.
 The bank sends a verification code to your smartphone.
 You enter the verification code.
 The bank verifies the code.
 If both factors are correct, you gain access to your account.

Benefits of Two-Factor Authentication:


 Enhanced Security: Even if one factor (e.g., the password) is compromised, the account remains protected by
the second factor.
 Protection Against Common Attacks: Provides better security against phishing, keyloggers, and other common
attacks.

Drawbacks of Two-Factor Authentication:


 Convenience: Requires an additional step during the login process, which can be seen as less convenient.
 Dependence on a Second Device: The user must have access to the second factor device (e.g., smartphone),
which can be an issue if it's lost or unavailable.
3.Multi-factor authentication (MFA) is a security system that requires more than one method of authentication from
independent categories of credentials to verify the user's identity. This enhances security by adding multiple layers of
protection against unauthorized access.
(Think of accessing a high-security facility. You might need a combination of a key card (something you have), a PIN
(something you know), and a biometric scan (something you are) to gain entry.)

Key Concepts:

 MFA typically combines two or more of the following factors:


 Something You Know: A password, PIN, or security question.
 Something You Have: A physical device, such as a smartphone, smart card, or hardware token.
 Something You Are: Biometric data, such as fingerprints, iris scans, or facial recognition.

How Multi-Factor Authentication Works – Example:


 Scenario: Logging into a Corporate Network
 User Attempts to Log In:
 You want to access your company's network remotely.
 You go to the company's VPN login page.
 Entering Credentials (First Factor - Something You Know):
 You enter your username and password.
 Verification of First Factor:
 The VPN server verifies the entered password against the one stored in its database.
 If the password is correct, the server proceeds to the second factor.
 Prompt for Second Factor:
 The VPN server prompts you to enter a one-time passcode (OTP) generated by an authenticator app on your
smart phone.
 Entering Second Factor (Something You Have):
 You open the authenticator app on your smartphone and enter the OTP displayed.
 Verification of Second Factor:
 The VPN server verifies the OTP entered against the expected code.
 Prompt for Third Factor (Optional - Something You Are):
 The VPN server may prompt you to scan your fingerprint on a biometric scanner.
 Verification of Third Factor:
 The biometric scanner verifies your fingerprint.
 Access Granted:
 If all factors are correct, you gain access to the company's network.

Example Workflow:
 You go to the company's VPN login page.
 You enter your username and password.
 The VPN server verifies your password.
 The VPN server prompts you for an OTP.
 You open your authenticator app and enter the OTP.
 The VPN server verifies the OTP.
 The VPN server prompts you for a fingerprint scan (optional).
 The biometric scanner verifies your fingerprint.
 If all factors are correct, you gain access to the company's network.
Benefits of Multi-Factor Authentication:
 Enhanced Security: Multiple layers of protection make it more difficult for unauthorized users to access
accounts.
 Flexibility: Allows organizations to choose combinations of authentication factors based on their security needs.

Drawbacks of Multi-Factor Authentication:


 Complexity: Requires additional steps during the login process, which can be seen as less convenient.
 Dependency on External Factors: Relies on the availability and security of the second and third factor devices or
methods.

Biometric Authentication: Uses unique biological characteristics (fingerprints, facial recognition, iris scans) to verify
identity.

Certificate-based Authentication: Uses digital certificates issued by a trusted authority to authenticate identities in
digital transactions.

You might also like