06/09/24
AUTHENTICATION METHODS
Authentication is the process of identifying users that request access to a system, network or to a
device.
1. Passwords
A string of characters that allows a user access to a computer system, to a device or to a service.
Passwords are normally used:
- When accessing devices
- Your accounts (Banking, social media, email)
- Websites
Password protection
- Change passwords regularly
- Use strong passwords
- Run anti-spyware software
- Back up data
2. Zero login
Allows users to login to the computer systems without the need to type in a password. It uses
more secure alternatives like:
a. Biometrics – uses biological characteristics to verify a person’s identity and grant access. E.g.
fingerprints, facial recognition, DNA, retinal scans, voice recognition.
b. Behavioural patterns – it pays attention to unique habits like, how they swipe, how they
walk.
3. Magnetic stripe cards
The magnetic stripe is on the reverse side of the card. It contains data such as name, ID,
number, gender, and date of birth. The stripe is read by swiping through a card reader.
Advantages:
- Easy to use
- Not an expensive technology (cheap)
- Can be remotely deactivated.
Disadvantages:
- Less secure than biometrics
- Wear out with a lot of use
4. Physical tokens
A form of authentication in the form of a physical or solid object. An item or card that displays or
contains information about a user and can be verified by the system. E.g. smart cards, USB
tokens
Advantages
- Enhanced security
- Durability – long lasting
Disadvantages
- Can be expensive to purchase
- Can be easily lost
- High risk of damage
5. Electronic tokens
Software installed on a user’s device, such as a smartphone, generates a one-time password
(OTP). The OTP is valid for less than a minute. The user enters the OTP when prompted by the
website, together with other forms of authentication such as PIN, face ID.
Advantages:
- Convenient – easily accessible through personal devices
- Less expensive to manage
Disadvantages:
- Prone to cyber attacks
- User must have their device on hand and charged
- Requires regular updates
6. Anti malware
A software program created to protect information systems and individual computers from
malicious software of malware. They scan the computer system to prevent, detect and remove
malware (software designed to disrupt, damage, steal data, or gain unauthorized access to a
computer system).
An anti-virus is loaded into the computer and the run to allow all software and devices to be
scanned for viruses and anti - malware is used to detect and remove a wider range of threats.
Anti – virus needs to be kept up to date because new viruses are constantly being discovered.