Want to create interactive content? It’s easy in Genially!

Get started free

Module 3: Lesson 4 Sem B Methods of Authentication

Teaching and Learning

Created on October 7, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Fill in Blanks

Countdown

Stopwatch

Unpixelator

Break the Piñata

Bingo

Create a Secret Code

Transcript

Methods of Authentication

Click here or there to move to the next page!

Whiteboard Security. (2024, November 16). Authentication Methods In Cyber Security [Video]. https://youtu.be/4eJbbNRXFnY

Show Text Version

Next

Card

  • What you have: Smart card
  • Smart cards – embedded with a chip that is automatically recognized by an authenticating device.
  • Proximity Reader - can sense a Smart Card or Key Fob without direct contact. Can even detect in a pocket or purse.

Back

Next

Certificate

  • What you have: Certificate
  • Certificate – servers use these to authenticate remotely such as with a browser. To use a certificate, the server owner must provide a 3rd party authority with documentation.
  • Click on this lock in your browser bar to see the certificate info for a website

Back

Next

Biometrics

  • What you are: Part of your body
  • Uses a measurable physical characteristic to verify identity BUT can be expensive to implement
    • Fingerprint
    • Retina scan
    • Voice
    • Typing speed
    • What’s next?

Back

Next

Options for Biometric Authentication

Green: best Red: worst

Source: http://www.bromba.com/faq/biofaqe.htm

Back

Next

Two-Factor Authentication

Duo Security. (2016, June 2). What is Two-Factor Authentication? (2FA) [Video]. https://youtu.be/0mvCeNsTa1g?si=sZcHgodnyFLGnFrU

Show Text Version

Back

Next

Multi-Factor Authentication (MFA)

  • What you have and know: Token, Phone, Device and password
  • Uses more than one method of authentication to increase security
Token – A hardware device which changes a code, usually every 60 seconds. The code is known as a One Time Password (OTP): Since it is used only once it is the best protection against an intercepted password.

Back

Next

Stopping Password Attacks

#1: Strong passwords – it won’t be in a dictionary, and it takes too long to crack!

#2: Lockout after several unsuccessful login attempts *useful to stop all guessing methods

#3: Use Multi-Factor or Two-Factor AuthenticationEx: password + PIN to phone

Back

The video describes various authentication methods used in cybersecurity, the techniques systems use to confirm a user’s identity before granting access to data or services. It explains why authentication matters and how different methods offer different levels of protection.

  • What is Authentication?: It’s the process of checking that someone really is who they claim to be. Without authentication, unauthorized users could gain access to protected resources.
  • Common Methods Covered: The video covers multiple authentication methods. These may include passwords, multifactor authentication, and other security techniques (depending on system requirements).
  • Strength and Weakness of Methods: Some methods are more secure than others. Simple passwords can be compromised more easily, while stronger or multi-layered authentication significantly improves security.
  • Why Choose the Right Method: The video emphasizes picking an authentication method appropriate for the sensitivity of the data or account being protected: stronger security for more sensitive information.

The Problem with Passwords: Passwords, even complicated ones, are not enough to prevent account takeover. A single phishing email or data breach can expose your password to the world. The Solution—Two Factors: Two-Factor Authentication (2FA) adds a second method of identity verification to secure your accounts. It combines: Something you know (Your password) Something you have (Something unique like your phone or fingerprint) How 2FA Protects You: By requiring both factors, attackers cannot access your account even if they manage to steal your password. Common 2FA Methods: The most common method uses a unique one-time code sent via text message or generated by a smartphone or token. The most modern and secure form uses a mobile app to send a simple approval notification to your smartphone or Smartwatch. Conclusion: Two-factor authentication is the most effective method of prevention, given that 95% of breaches involve account takeover. It is an easy and effective step that businesses, governments, and individuals should enable on all accounts.