0% found this document useful (0 votes)
40 views2 pages

Syed Shoaib Ali

Uploaded by

Vivek Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views2 pages

Syed Shoaib Ali

Uploaded by

Vivek Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1

Response

Hello Syed Shoaib Ali,

Based on your discussion post, I learned about the multi-factor authentication approach in

identity theft. In the current digital landscape, identity theft has become a persistent threat,

requiring the application of progressive events to maintain complex information. Contemporary

approaches, including biometric identification, two-factor documentation, protection from

services of identity theft, multi-factor identification, and credit surveillance services, have

developed as essential tools (Ometov et al., 2018). Among these, MFA (multiple-factor

authentication) stands out as the most operative approach for opposing the rising requests of

identity theft, proposing a strong framework for improving safety through numerous platforms.

MFA (Multi-factor authentication) can help decrease the hazard of account appropriations and

protect customers and their information. It can be used along with weak or stolen passwords, as

over 80% of cyber breaches occur due to these exposures. MFA provides supplementary security

and individuality pledges in case of password theft (Otta et al., 2023). It has drawbacks such as

locking users out of accounts, taking more time, and requiring contract out. It can be tedious for

users and depend on on third-party facilities like SMS for verification codes. Despite these

drawbacks, MFA is vital for preserving safety in administrations.


2

References

Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018).

Multi-Factor Authentication: A Survey. Cryptography, 2(1), 1.

https://doi.org/10.3390/cryptography2010001

Otta, S. P., Panda, S., Gupta, M., & Hota, C. (2023). A Systematic Survey of Multi-Factor

Authentication for Cloud Infrastructure. Future Internet, 15(4), 146.

https://doi.org/10.3390/fi15040146

You might also like