USER AUTHENTICATION
Presented By : Robin
Roll No. :23188
• Verifying the identity of user is called as user
authentication.
• User authentication verifies the identity and
other credentials of a user who is attempting to
gain access to computing resources or
networks.
Three tasks under user authentication:
 Identification
 Authentication
 Authorization
Introduction to User Authentication
 Ensures authorized access
 Protects sensitive data
 Maintains user accountability
The Role of Authentication
 Single-Factor Authentication(SFA)
 Two-Factor Authentication(2FA)
 Multi-Factor Authentication(MFA)
advantages of using multiple factors
Common Authentication Methods
 Security process that requires two forms of
verification before granting access to an
account.
 This involves something you know (like
password) and something you have(like text
message with a verification code).
 Methods of 2FA includes SMS codes,
authenticator apps, biometric verification.
Two-Factor Authentication(2FA)
 Authentication method that requires two or
more independent ways to identify a user.
 MFA increases the confidence of users by
adding multiple layers of security.
 Example: Codes generated from the user’s
smart phone, captcha tests, fingerprints, voice
biometrics or facial recognition.
Multi-Factor Authentication(MFA)
• Password-Based Authentication
• Biometric Authentication
Examples: Fingerprints, facial recognition, retina
patterns
• Token-Based Authentication
Smart cards, tokens
Types of Authentication
 Passwords are most common methods of
authentication.
 Passwords can be in the form of a string of
letters, numbers, or special characters.
 User need to create strong passwords that
include a combination of all possible options to
prevent from phishing attacks.
Password Authentication
 Depends on the unique biological
characteristics of an individual.
 Used by consumers, governments and private
corporations including airports, military bases
and national borders.
 Example:
• Facial recognition
• Fingerprint scanners
• Speaker recognition
• Eye scanners
Biometric Authentication
• Phishing Attacks
• Password Weakness
• Brute Force Attacks: An attacker will try
multiple usernames and passwords until they
gain access to a valid account.
• Social Engineering
• Lack of Multi-Factor Authentication(MFA)
Security Challenges
 Use Strong Password Policies
 Implement Multi-Factor Authentication
 Limit Login Attempts
 Educate Users
 Session Management
Best Practices for User
Authentication
THANK YOU

USER AUTHENTICATION in information security.pptx

  • 1.
    USER AUTHENTICATION Presented By: Robin Roll No. :23188
  • 2.
    • Verifying theidentity of user is called as user authentication. • User authentication verifies the identity and other credentials of a user who is attempting to gain access to computing resources or networks. Three tasks under user authentication:  Identification  Authentication  Authorization Introduction to User Authentication
  • 3.
     Ensures authorizedaccess  Protects sensitive data  Maintains user accountability The Role of Authentication
  • 4.
     Single-Factor Authentication(SFA) Two-Factor Authentication(2FA)  Multi-Factor Authentication(MFA) advantages of using multiple factors Common Authentication Methods
  • 5.
     Security processthat requires two forms of verification before granting access to an account.  This involves something you know (like password) and something you have(like text message with a verification code).  Methods of 2FA includes SMS codes, authenticator apps, biometric verification. Two-Factor Authentication(2FA)
  • 6.
     Authentication methodthat requires two or more independent ways to identify a user.  MFA increases the confidence of users by adding multiple layers of security.  Example: Codes generated from the user’s smart phone, captcha tests, fingerprints, voice biometrics or facial recognition. Multi-Factor Authentication(MFA)
  • 7.
    • Password-Based Authentication •Biometric Authentication Examples: Fingerprints, facial recognition, retina patterns • Token-Based Authentication Smart cards, tokens Types of Authentication
  • 8.
     Passwords aremost common methods of authentication.  Passwords can be in the form of a string of letters, numbers, or special characters.  User need to create strong passwords that include a combination of all possible options to prevent from phishing attacks. Password Authentication
  • 9.
     Depends onthe unique biological characteristics of an individual.  Used by consumers, governments and private corporations including airports, military bases and national borders.  Example: • Facial recognition • Fingerprint scanners • Speaker recognition • Eye scanners Biometric Authentication
  • 10.
    • Phishing Attacks •Password Weakness • Brute Force Attacks: An attacker will try multiple usernames and passwords until they gain access to a valid account. • Social Engineering • Lack of Multi-Factor Authentication(MFA) Security Challenges
  • 11.
     Use StrongPassword Policies  Implement Multi-Factor Authentication  Limit Login Attempts  Educate Users  Session Management Best Practices for User Authentication
  • 12.