Information Security 02 - Authentication Models
Information Security 02 - Authentication Models
Arfan Shahzad
{ arfanskp@gmail.com }
Course Outline
Authentication Models
1. Single-factor authentication
4. Risk-based authentication
5. Federated authentication
6. Adaptive authentication
7. Continuous authentication
Authentication Models cont…
Single-factor authentication
• Single-factor authentication (SFA) is a method of verifying a user's
identity by requiring only one piece of information or credential,
typically a password, in order to grant access to a system or resource.
• SFA is the most basic form of authentication and is still widely used,
particularly in consumer applications.
Authentication Models cont…
Single-factor authentication
Authentication Models cont…
Single-factor authentication
• However, it is generally considered to be less secure than multi-factor
authentication (MFA), which requires additional verification methods
beyond just a password.
• The weaknesses of SFA lie in the fact that passwords can be easily
guessed or stolen, leaving systems vulnerable to unauthorized access.
Authentication Models cont…
Single-factor authentication
• This is why many organizations have moved towards implementing
MFA, which adds an additional layer of security by requiring users to
provide a second form of authentication, such as a fingerprint or a
security token, in addition to their password.
Authentication Models cont…
Two-factor authentication
• Two-factor authentication (2FA) is a security process in which a user
provides two different authentication factors to verify their identity.
• For example, when logging into an account, the user enters their
password (something they know) and receives a unique code on their
smartphone (something they have) that they must also enter to gain
access.
Authentication Models cont…
Two-factor authentication
• This makes it much more difficult for an attacker to gain unauthorized
access to the account, as they would need to obtain both factors
rather than just one (e.g., by stealing a password or a device).
Authentication Models cont…
Multi-factor authentication
• Multi-factor authentication (MFA) is
a security mechanism that requires
the user to provide two or more
forms of identification before being
granted access to a system,
application, or device.
Authentication Models cont…
Multi-factor authentication
• The three main categories of authentication factors used in MFA are:
• For example, if the risk score is high, the user may be required to provide
additional authentication factors such as biometric verification or a one-time
passcode.
• It can also provide enhanced security for remote workers, who may
be accessing corporate resources from a variety of devices and
locations.
Authentication Models cont…
Continuous authentication
• There are several technologies that can be used to implement
continuous authentication, including machine learning algorithms,
behavioral biometrics, and risk-based authentication models.