Section 17.158 Multi-factor Authentication Flashcards

Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.

1
Q

Multi-factor Authentication (MFA)

A

A security system requiring multiple/combined methods of authentication from independent categories of credentials

■ Enhances security by creating a layered defense against unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Five Categories of Authentication for MFA

Something You Know (Knowledge-Based Factor)

A

Authentication based on information the user knows, like a password, PIN, or answers to secret questions

Knowledge-based factors like passwords and PINs are the most common authentication methods

e.g unlocking iphone with 6 digit pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Five Categories of Authentication for MFA

Something You Have (Possession-Based Factor)

A

Authentication based on physical possession of an item

○ Smart card (unlock laptop before use with card and pin)
○ Hardware token (key fob)
○ Software token on a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Five Categories of Authentication for MFA

Something You Are (Inherence-Based Factor)

A

Authentication based on biometric characteristics unique to individuals

○ Fingerprints
○ Facial recognition (face id)
○ Voice recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Five Categories of Authentication for MFA

Somewhere You Are (Location-Based Factor)

A

Authentication based on the user’s location, determined through IP address, GPS, or network connection

● Geographical location restrictions can be applied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Five Categories of Authentication for MFA

Something You Do (Behavior-Based Factor)

A

Authentication based on recognising unique patterns associated with user behavior

○ Keystroke patterns
○ Device interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication Types

Single Factor Authentication

A

Uses one authentication factor to access a user account

e.g Username and Password (Both knowledge base factors)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication Types

Two Factor Authentication (2FA)

A

Requires two different authentication factors to gain access

e.g Username and Password then a text message to your samrt phone: Knowledge and Possesion Factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication Types

Multi-factor Authentication (MFA)

A

Uses two or more factors to authenticate a user. MFA can involve 2, 3, 4, or 5 factors depending on the chosen
configuration

Generally, using more authentication types makes a system safer, but is less convenient for the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Password managers

A

Password managers can generate different long, strong, and complex passwords for each website or application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passkeys (Passwordless Authentication)

A

An alternative to traditional passwords for authentication Involves creating a passkey secured by device authentication methods like fingerprint or facial recognition

● Provides a more secure and user-friendly authentication method

● Passkeys utilise public key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly