0% found this document useful (0 votes)
7 views12 pages

User Authentication

Uploaded by

huntergrave9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views12 pages

User Authentication

Uploaded by

huntergrave9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

USER

AUTHENTICATION

Presented By : Robin
Roll No. :23188
Introduction to User
Authentication
• Verifying the identity of user is called as
user authentication.
• User authentication verifies the identity and

other credentials of a user who is


attempting to gain access to computing
resources or networks.
Three tasks under user authentication:
 Identification
 Authentication
 Authorization
The Role of Authentication
 Ensures authorized access
 Protects sensitive data
 Maintains user accountability
Common Authentication
Methods
 Single-Factor Authentication(SFA)

 Two-Factor Authentication(2FA)

 Multi-Factor Authentication(MFA)
advantages of using multiple factors
Two-Factor Authentication(2FA)
 Security process that requires two forms of
verification before granting access to an
account.
 This involves something you know (like

password) and something you have(like text


message with a verification code).
 Methods of 2FA includes SMS codes,

authenticator apps, biometric verification.


Multi-Factor
Authentication(MFA)
 Authentication method that requires two or
more independent ways to identify a user.
 MFA increases the confidence of users by

adding multiple layers of security.


 Example: Codes generated from the user’s

smart phone, captcha tests, fingerprints,


voice biometrics or facial recognition.
Types of Authentication
• Password-Based Authentication

• Biometric Authentication
Examples: Fingerprints, facial recognition,
retina patterns

• Token-Based Authentication
Smart cards, tokens
Password Authentication
 Passwords are most common methods of
authentication.
 Passwords can be in the form of a string of

letters, numbers, or special characters.


 User need to create strong passwords that

include a combination of all possible options


to prevent from phishing attacks.
Biometric Authentication
 Depends on the unique biological
characteristics of an individual.
 Used by consumers, governments and

private corporations including airports,


military bases and national borders.
 Example:

• Facial recognition
• Fingerprint scanners
• Speaker recognition
• Eye scanners
Security Challenges
• Phishing Attacks
• Password Weakness
• Brute Force Attacks: An attacker will try
multiple usernames and passwords until
they gain access to a valid account.
• Social Engineering
• Lack of Multi-Factor Authentication(MFA)
Best Practices for User
Authentication
 Use Strong Password Policies
 Implement Multi-Factor Authentication
 Limit Login Attempts
 Educate Users
 Session Management
THANK YOU

You might also like