User Authentication
User Authentication
AUTHENTICATION
Presented By : Robin
Roll No. :23188
Introduction to User
Authentication
• Verifying the identity of user is called as
user authentication.
• User authentication verifies the identity and
Two-Factor Authentication(2FA)
Multi-Factor Authentication(MFA)
advantages of using multiple factors
Two-Factor Authentication(2FA)
Security process that requires two forms of
verification before granting access to an
account.
This involves something you know (like
• Biometric Authentication
Examples: Fingerprints, facial recognition,
retina patterns
• Token-Based Authentication
Smart cards, tokens
Password Authentication
Passwords are most common methods of
authentication.
Passwords can be in the form of a string of
• Facial recognition
• Fingerprint scanners
• Speaker recognition
• Eye scanners
Security Challenges
• Phishing Attacks
• Password Weakness
• Brute Force Attacks: An attacker will try
multiple usernames and passwords until
they gain access to a valid account.
• Social Engineering
• Lack of Multi-Factor Authentication(MFA)
Best Practices for User
Authentication
Use Strong Password Policies
Implement Multi-Factor Authentication
Limit Login Attempts
Educate Users
Session Management
THANK YOU