USER
AUTHENTICATION
Presented By : Robin
Roll No. :23188
Introduction to User
Authentication
• Verifying the identity of user is called as
user authentication.
• User authentication verifies the identity and
other credentials of a user who is
attempting to gain access to computing
resources or networks.
Three tasks under user authentication:
Identification
Authentication
Authorization
The Role of Authentication
Ensures authorized access
Protects sensitive data
Maintains user accountability
Common Authentication
Methods
Single-Factor Authentication(SFA)
Two-Factor Authentication(2FA)
Multi-Factor Authentication(MFA)
advantages of using multiple factors
Two-Factor Authentication(2FA)
Security process that requires two forms of
verification before granting access to an
account.
This involves something you know (like
password) and something you have(like text
message with a verification code).
Methods of 2FA includes SMS codes,
authenticator apps, biometric verification.
Multi-Factor
Authentication(MFA)
Authentication method that requires two or
more independent ways to identify a user.
MFA increases the confidence of users by
adding multiple layers of security.
Example: Codes generated from the user’s
smart phone, captcha tests, fingerprints,
voice biometrics or facial recognition.
Types of Authentication
• Password-Based Authentication
• Biometric Authentication
Examples: Fingerprints, facial recognition,
retina patterns
• Token-Based Authentication
Smart cards, tokens
Password Authentication
Passwords are most common methods of
authentication.
Passwords can be in the form of a string of
letters, numbers, or special characters.
User need to create strong passwords that
include a combination of all possible options
to prevent from phishing attacks.
Biometric Authentication
Depends on the unique biological
characteristics of an individual.
Used by consumers, governments and
private corporations including airports,
military bases and national borders.
Example:
• Facial recognition
• Fingerprint scanners
• Speaker recognition
• Eye scanners
Security Challenges
• Phishing Attacks
• Password Weakness
• Brute Force Attacks: An attacker will try
multiple usernames and passwords until
they gain access to a valid account.
• Social Engineering
• Lack of Multi-Factor Authentication(MFA)
Best Practices for User
Authentication
Use Strong Password Policies
Implement Multi-Factor Authentication
Limit Login Attempts
Educate Users
Session Management
THANK YOU