Authentication¶
Authentication is a cybersecurity measure to verify that individuals or entities are who they claim to be during digital interactions. Its purpose is to confirm identity and prevent unauthorized access.
Analogy: Authentication Test¶
- Receiving a letter from an official agency (e.g. IRS) with identifying information (official stamps, social security number, etc.) is trusted over an anonymous letter.
- This comparison highlights how authentication works to verify legitimacy.
Five Common Authentication Methods¶
-
Something You Know (Knowledge Factor)
- Relies on information the user knows, such as a password or PIN.
- Most common example: username and password combinations.
-
Something You Have (Possession Factor)
- Involves a physical item the user presents, like an ID badge or a one-time code sent to a smartphone.
- Example: security badges or SMS codes.
-
Something You Are (Inherence Factor)
- Based on unique physical or behavioral traits, known as biometric authentication.
- Examples: facial recognition and fingerprint scanning.
-
Something You Do (Action Factor)
- Uses a unique action, like a secret handshake or a specific way of typing.
- Example: handwriting analysis or walking style.
-
Somewhere You Are (Location Factor)
- Relies on a specific geographic location.
- Example: geofencing, such as limiting access based on proximity to a specific area.
Multi-Factor Authentication (MFA)¶
- Multi-Factor Authentication (MFA): Combining two or more of the above factors for stronger security.
- Two-Factor Authentication (2FA): Using exactly two factors.
- MFA ensures that even if one factor is compromised, access still requires another secure factor.
Importance of Authentication¶
-
Preventing Unauthorized Access
- Strong authentication models help protect systems from unauthorized users, like bank accounts requiring secure logins.
-
Protecting User Data and Privacy
- Authentication ensures that sensitive information is accessed only by authorized individuals, protecting user privacy.
- Example: access to personal health records through secure patient portals.
-
Ensuring Resource Validity
- Controls access to shared resources, such as cloud storage or network bandwidth, so only valid users can access these resources.