SlideShare a Scribd company logo
1 of 2
Voice vs.SMS Authentication
Times are changing. For instance, we no longer see people standing in line at the bank to make a
transaction, they now go online as it is more convenient.
From buying air tickets to making hotel reservations, nowadays everything can now be done virtually
without having to leave home.
But as technology evolves and becomes more sophisticated, so have attacks on cyber security. These
attacks are no longer performed by simple individuals. They have becomepart of a complex and
organized network – more intelligent, more persistent, and more ingenious.
Needless to say, a lot is at stake for the entire online business community. For a lot of online merchants,
fraud prevention has become the key to their survival. Two factor authentication is one of the effective
methods to stop fraud, check losses and increase customer satisfaction.
What is Two Factor Authentication?
As opposed to single factor authentication, which uses only one form of ID to verify a user, two factor
authenticationor 2FArequires the presence of two authentication factors. Typically, these factors are:
1. Something the user knows
2. Something the user has
The 2FA system, therefore, adds another layer of security beyond username and password. But why do
we need a second layer of security? Well, like we mentioned earlier, cyber criminals have become more
refined than ever. Cracking password is no longer difficult for their lot.
Password cracking methods like keystroke logging, brute force attack, dictionary attack, etc. are
commonly and routinely used to gain unauthorized access to accounts. Net result: an online environment
that relies solely on username-password authentication system is not secure anymore.
Phone Verification
The most convenient and cost-effective authentication device used in the 2FA system is thetelephone.
The system converts the user’s phone in to an authentication device through the use of text messaging or
interactive voice calls.
When it comes to phone verification, it is important to give user’s a choice between an SMS or voice-
based authentication for better customer satisfaction. While there’s reason to believe that most
authentication applications focus on SMS-enabled mobile phones, we should not forget that some people
may actually prefer voice-based authentication.
In fact, 53% of adult cell phone owners questionedin a survey conducted by the Pew Internet and
American Life Project on Americans and Text Messaging said they preferred receiving a voice call to a
text message*.
But how exactly are SMS and voice authentication different from each other? Well, the truth is that they’re
not handled all that differently. Both work on essentially the same principle – in order to authenticate a
user, a temporary PIN is sent to the phone owner.
The difference lies in the way the user chooses to receive this information. For those who have an SMS-
enabled phone and prefer that mode of communication, the PIN is sent via a text message. Individuals
who prefer voice calls to text messages or have phones that don’t support SMS messaging receive the
PIN through an interactive telephone call.
So, if you are a business looking for a reliable phone verification system, look for options that provide
both voice and SMS-enabled authentication solutions. After all, it’s the question of winning over your
customers by providing them impenetrable security and excellent user experience.
Sources:
*pewinternet.org/Reports/2011/Cell-Phone-Texting-2011.aspx

More Related Content

Viewers also liked

Sc usage usage map - by country - feb 09
Sc usage   usage map - by country - feb 09Sc usage   usage map - by country - feb 09
Sc usage usage map - by country - feb 09bedfordgrp
 
The Clark\'s 2008
The Clark\'s 2008The Clark\'s 2008
The Clark\'s 2008Jason Clark
 
Promenade en Champagne méridionale
Promenade en Champagne méridionalePromenade en Champagne méridionale
Promenade en Champagne méridionaleJeanJacques Tijet
 
Før og ettertest andres personlige opplysninger 7 trinn
Før og ettertest andres personlige opplysninger 7 trinnFør og ettertest andres personlige opplysninger 7 trinn
Før og ettertest andres personlige opplysninger 7 trinniktplan
 
Guide Degustation Vins de Chypre
Guide Degustation Vins de ChypreGuide Degustation Vins de Chypre
Guide Degustation Vins de Chypreoniro vins
 
Assistive Technology Nguyen
Assistive Technology NguyenAssistive Technology Nguyen
Assistive Technology NguyenTuyet Nguyen
 
Ud3 recursosdelanatura
Ud3 recursosdelanaturaUd3 recursosdelanatura
Ud3 recursosdelanaturamarcapmany
 
Desproges Proverbes A
Desproges Proverbes A Desproges Proverbes A
Desproges Proverbes A Imhotep
 
13 Trends Sure to Impact 2013
13 Trends Sure to Impact 201313 Trends Sure to Impact 2013
13 Trends Sure to Impact 2013Charla Sindelar
 
Hª españa thème 02 espagne romaine
Hª españa thème 02 espagne romaineHª españa thème 02 espagne romaine
Hª españa thème 02 espagne romaineviruzain
 
Delicious
DeliciousDelicious
Deliciousnefaidy
 

Viewers also liked (16)

Sc usage usage map - by country - feb 09
Sc usage   usage map - by country - feb 09Sc usage   usage map - by country - feb 09
Sc usage usage map - by country - feb 09
 
The Clark\'s 2008
The Clark\'s 2008The Clark\'s 2008
The Clark\'s 2008
 
Convergencia
ConvergenciaConvergencia
Convergencia
 
Promenade en Champagne méridionale
Promenade en Champagne méridionalePromenade en Champagne méridionale
Promenade en Champagne méridionale
 
Amor
AmorAmor
Amor
 
Før og ettertest andres personlige opplysninger 7 trinn
Før og ettertest andres personlige opplysninger 7 trinnFør og ettertest andres personlige opplysninger 7 trinn
Før og ettertest andres personlige opplysninger 7 trinn
 
Ntic
NticNtic
Ntic
 
Guide Degustation Vins de Chypre
Guide Degustation Vins de ChypreGuide Degustation Vins de Chypre
Guide Degustation Vins de Chypre
 
Activitat efecte hivernacle
Activitat efecte hivernacleActivitat efecte hivernacle
Activitat efecte hivernacle
 
Assistive Technology Nguyen
Assistive Technology NguyenAssistive Technology Nguyen
Assistive Technology Nguyen
 
EXCEL
EXCELEXCEL
EXCEL
 
Ud3 recursosdelanatura
Ud3 recursosdelanaturaUd3 recursosdelanatura
Ud3 recursosdelanatura
 
Desproges Proverbes A
Desproges Proverbes A Desproges Proverbes A
Desproges Proverbes A
 
13 Trends Sure to Impact 2013
13 Trends Sure to Impact 201313 Trends Sure to Impact 2013
13 Trends Sure to Impact 2013
 
Hª españa thème 02 espagne romaine
Hª españa thème 02 espagne romaineHª españa thème 02 espagne romaine
Hª españa thème 02 espagne romaine
 
Delicious
DeliciousDelicious
Delicious
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Voice vs. SMS Authentication

  • 1. Voice vs.SMS Authentication Times are changing. For instance, we no longer see people standing in line at the bank to make a transaction, they now go online as it is more convenient. From buying air tickets to making hotel reservations, nowadays everything can now be done virtually without having to leave home. But as technology evolves and becomes more sophisticated, so have attacks on cyber security. These attacks are no longer performed by simple individuals. They have becomepart of a complex and organized network – more intelligent, more persistent, and more ingenious. Needless to say, a lot is at stake for the entire online business community. For a lot of online merchants, fraud prevention has become the key to their survival. Two factor authentication is one of the effective methods to stop fraud, check losses and increase customer satisfaction. What is Two Factor Authentication? As opposed to single factor authentication, which uses only one form of ID to verify a user, two factor authenticationor 2FArequires the presence of two authentication factors. Typically, these factors are: 1. Something the user knows 2. Something the user has The 2FA system, therefore, adds another layer of security beyond username and password. But why do we need a second layer of security? Well, like we mentioned earlier, cyber criminals have become more refined than ever. Cracking password is no longer difficult for their lot. Password cracking methods like keystroke logging, brute force attack, dictionary attack, etc. are commonly and routinely used to gain unauthorized access to accounts. Net result: an online environment that relies solely on username-password authentication system is not secure anymore. Phone Verification The most convenient and cost-effective authentication device used in the 2FA system is thetelephone. The system converts the user’s phone in to an authentication device through the use of text messaging or interactive voice calls. When it comes to phone verification, it is important to give user’s a choice between an SMS or voice- based authentication for better customer satisfaction. While there’s reason to believe that most authentication applications focus on SMS-enabled mobile phones, we should not forget that some people may actually prefer voice-based authentication. In fact, 53% of adult cell phone owners questionedin a survey conducted by the Pew Internet and American Life Project on Americans and Text Messaging said they preferred receiving a voice call to a text message*. But how exactly are SMS and voice authentication different from each other? Well, the truth is that they’re not handled all that differently. Both work on essentially the same principle – in order to authenticate a user, a temporary PIN is sent to the phone owner. The difference lies in the way the user chooses to receive this information. For those who have an SMS- enabled phone and prefer that mode of communication, the PIN is sent via a text message. Individuals
  • 2. who prefer voice calls to text messages or have phones that don’t support SMS messaging receive the PIN through an interactive telephone call. So, if you are a business looking for a reliable phone verification system, look for options that provide both voice and SMS-enabled authentication solutions. After all, it’s the question of winning over your customers by providing them impenetrable security and excellent user experience. Sources: *pewinternet.org/Reports/2011/Cell-Phone-Texting-2011.aspx