Methods of Authentication
Click here or there to move to the next page!
Whiteboard Security. (2024, November 16). Authentication Methods In Cyber Security [Video]. https://youtu.be/4eJbbNRXFnY
Show Text Version
Next
Card
- What you have: Smart card
- Smart cards – embedded with a chip that is automatically recognized by an authenticating device.
- Proximity Reader - can sense a Smart Card or Key Fob without direct contact. Can even detect in a pocket or purse.
Back
Next
Certificate
- What you have: Certificate
- Certificate – servers use these to authenticate remotely such as with a browser. To use a certificate, the server owner must provide a 3rd party authority with documentation.
- Click on this lock in your browser bar to see the certificate info for a
website
Back
Next
Biometrics
- What you are: Part of your body
- Uses a measurable physical characteristic to verify identity BUT can be expensive to implement
- Fingerprint
- Retina scan
- Voice
- Typing speed
- What’s next?
Back
Next
Options for Biometric Authentication
Green: best Red: worst
Source: http://www.bromba.com/faq/biofaqe.htm
Back
Next
Two-Factor Authentication
Duo Security. (2016, June 2). What is Two-Factor Authentication? (2FA) [Video]. https://youtu.be/0mvCeNsTa1g?si=sZcHgodnyFLGnFrU
Show Text Version
Back
Next
Multi-Factor Authentication (MFA)
- What you have and know: Token, Phone, Device and password
- Uses more than one method of authentication to increase security
Token – A hardware device which changes a code, usually every 60 seconds. The code is known as a One Time Password (OTP): Since it is used only once it is the best protection against an intercepted password.
Back
Next
Stopping Password Attacks
#1: Strong passwords – it won’t be in a dictionary, and it takes too long to crack!
#2: Lockout after several unsuccessful login attempts *useful to stop all guessing methods
#3: Use Multi-Factor or Two-Factor AuthenticationEx: password + PIN to phone
Back
The video describes various authentication methods used in cybersecurity, the techniques systems use to confirm a user’s identity before granting access to data or services. It explains why authentication matters and how different methods offer different levels of protection.
- What is Authentication?: It’s the process of checking that someone really is who they claim to be. Without authentication, unauthorized users could gain access to protected resources.
- Common Methods Covered: The video covers multiple authentication methods. These may include passwords, multifactor authentication, and other security techniques (depending on system requirements).
- Strength and Weakness of Methods: Some methods are more secure than others. Simple passwords can be compromised more easily, while stronger or multi-layered authentication significantly improves security.
- Why Choose the Right Method: The video emphasizes picking an authentication method appropriate for the sensitivity of the data or account being protected: stronger security for more sensitive information.
The Problem with Passwords: Passwords, even complicated ones, are not enough to prevent account takeover. A single phishing email or data breach can expose your password to the world. The Solution—Two Factors: Two-Factor Authentication (2FA) adds a second method of identity verification to secure your accounts. It combines: Something you know (Your password) Something you have (Something unique like your phone or fingerprint) How 2FA Protects You: By requiring both factors, attackers cannot access your account even if they manage to steal your password. Common 2FA Methods: The most common method uses a unique one-time code sent via text message or generated by a smartphone or token. The most modern and secure form uses a mobile app to send a simple approval notification to your smartphone or Smartwatch. Conclusion: Two-factor authentication is the most effective method of prevention, given that 95% of breaches involve account takeover. It is an easy and effective step that businesses, governments, and individuals should enable on all accounts.
Module 3: Lesson 4 Sem B Methods of Authentication
Teaching and Learning
Created on October 7, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
SWOT Challenge: Classify Key Factors
View
Vision Board
View
Explainer Video: Keys to Effective Communication
View
Explainer Video: AI for Companies
View
Corporate CV
View
Flow Presentation
View
Discover Your AI Assistant
Explore all templates
Transcript
Methods of Authentication
Click here or there to move to the next page!
Whiteboard Security. (2024, November 16). Authentication Methods In Cyber Security [Video]. https://youtu.be/4eJbbNRXFnY
Show Text Version
Next
Card
Back
Next
Certificate
Back
Next
Biometrics
Back
Next
Options for Biometric Authentication
Green: best Red: worst
Source: http://www.bromba.com/faq/biofaqe.htm
Back
Next
Two-Factor Authentication
Duo Security. (2016, June 2). What is Two-Factor Authentication? (2FA) [Video]. https://youtu.be/0mvCeNsTa1g?si=sZcHgodnyFLGnFrU
Show Text Version
Back
Next
Multi-Factor Authentication (MFA)
- What you have and know: Token, Phone, Device and password
- Uses more than one method of authentication to increase security
Token – A hardware device which changes a code, usually every 60 seconds. The code is known as a One Time Password (OTP): Since it is used only once it is the best protection against an intercepted password.Back
Next
Stopping Password Attacks
#1: Strong passwords – it won’t be in a dictionary, and it takes too long to crack!
#2: Lockout after several unsuccessful login attempts *useful to stop all guessing methods
#3: Use Multi-Factor or Two-Factor AuthenticationEx: password + PIN to phone
Back
The video describes various authentication methods used in cybersecurity, the techniques systems use to confirm a user’s identity before granting access to data or services. It explains why authentication matters and how different methods offer different levels of protection.
The Problem with Passwords: Passwords, even complicated ones, are not enough to prevent account takeover. A single phishing email or data breach can expose your password to the world. The Solution—Two Factors: Two-Factor Authentication (2FA) adds a second method of identity verification to secure your accounts. It combines: Something you know (Your password) Something you have (Something unique like your phone or fingerprint) How 2FA Protects You: By requiring both factors, attackers cannot access your account even if they manage to steal your password. Common 2FA Methods: The most common method uses a unique one-time code sent via text message or generated by a smartphone or token. The most modern and secure form uses a mobile app to send a simple approval notification to your smartphone or Smartwatch. Conclusion: Two-factor authentication is the most effective method of prevention, given that 95% of breaches involve account takeover. It is an easy and effective step that businesses, governments, and individuals should enable on all accounts.