Lesson 4 | What are the key authentication techniques? |
Objective | Identify key authentication techniques. |
Key Authentication Techniques
The authentication process attempts to verify the identity of a user or system. After identification has been established, the authenticated system or user can then have access according to the parameters established by the systems administrator.
Authentication Methods
There are three methods by which users or systems can prove that they are what they claim to be. You can prove your identity by
- Proving what you know
- Showing what you have
- Demonstrating who you are
These three methods describe the various means of authentication as shown in the table below.
Which modern Authentication Techniques are used to implement Security?
There are several modern authentication techniques that are commonly used to implement security:
- Multi-Factor Authentication (MFA): This technique requires users to provide multiple forms of identification, such as a password and a fingerprint or a passcode sent to a mobile device.
- Single Sign-On (SSO): This technique allows users to access multiple applications with a single set of credentials, eliminating the need to remember multiple passwords.
- Passwordless Authentication: This technique eliminates the need for passwords by using alternative forms of authentication, such as biometrics or security keys.
- Two-Factor Authentication (2FA): This technique requires users to provide two forms of identification, such as a password and a fingerprint or a passcode sent to a mobile device.
- Passphrase: This technique uses a longer phrase to authentication rather than using traditional password
- Token-Based Authentication: This technique uses a token that is generated by the server and sent to the client to authenticate each subsequent request.
- Certificate-Based Authentication: This technique uses digital certificates to authenticate users and devices.
These are just a few examples of modern authentication techniques that are used to improve security. It's always important to use a combination of techniques and keep them updated to ensure the best possible security.
Cloud Security
Authentication Techniques
The most common authentication method on the Internet and in the computer world is password authentication. To create a more sophisticated authentication system, you might choose more than one authentication method. For instance, when securing a building both a card and a password might be required to enter the building. Techniques that augment authentication systems are
password generators and
one-time passwords (OTP).
These products are aimed at preventing
system snooping[1] and password hijacking. Because the passwords are used only once, a hacker who decodes any given password has no advantage.
Authentication Methods - Quiz
[1]System snooping: The action of a hacker who enters a computer network and begins mapping the contents of the system.