Want to create interactive content? It’s easy in Genially!

Get started free

Module 3: Lesson 4 Sem B Methods of Authentication

Teaching and Learning

Created on October 7, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

SWOT Challenge: Classify Key Factors

Vision Board

Explainer Video: Keys to Effective Communication

Explainer Video: AI for Companies

Corporate CV

Flow Presentation

Discover Your AI Assistant

Transcript

Methods of Authentication

Click here or there to move to the next page!

Whiteboard Security. (2024, November 16). Authentication Methods In Cyber Security [Video]. https://youtu.be/4eJbbNRXFnY

Show Text Version

Next

Card

  • What you have: Smart card
  • Smart cards – embedded with a chip that is automatically recognized by an authenticating device.
  • Proximity Reader - can sense a Smart Card or Key Fob without direct contact. Can even detect in a pocket or purse.

Back

Next

Certificate

  • What you have: Certificate
  • Certificate – servers use these to authenticate remotely such as with a browser. To use a certificate, the server owner must provide a 3rd party authority with documentation.
  • Click on this lock in your browser bar to see the certificate info for a website

Back

Next

Biometrics

  • What you are: Part of your body
  • Uses a measurable physical characteristic to verify identity BUT can be expensive to implement
    • Fingerprint
    • Retina scan
    • Voice
    • Typing speed
    • What’s next?

Back

Next

Options for Biometric Authentication

Green: best Red: worst

Source: http://www.bromba.com/faq/biofaqe.htm

Back

Next

Two-Factor Authentication

Duo Security. (2016, June 2). What is Two-Factor Authentication? (2FA) [Video]. https://youtu.be/0mvCeNsTa1g?si=sZcHgodnyFLGnFrU

Show Text Version

Back

Next

Multi-Factor Authentication (MFA)

  • What you have and know: Token, Phone, Device and password
  • Uses more than one method of authentication to increase security
Token – A hardware device which changes a code, usually every 60 seconds. The code is known as a One Time Password (OTP): Since it is used only once it is the best protection against an intercepted password.

Back

Next

Stopping Password Attacks

#1: Strong passwords – it won’t be in a dictionary, and it takes too long to crack!

#2: Lockout after several unsuccessful login attempts *useful to stop all guessing methods

#3: Use Multi-Factor or Two-Factor AuthenticationEx: password + PIN to phone

Back

The video describes various authentication methods used in cybersecurity, the techniques systems use to confirm a user’s identity before granting access to data or services. It explains why authentication matters and how different methods offer different levels of protection.

  • What is Authentication?: It’s the process of checking that someone really is who they claim to be. Without authentication, unauthorized users could gain access to protected resources.
  • Common Methods Covered: The video covers multiple authentication methods. These may include passwords, multifactor authentication, and other security techniques (depending on system requirements).
  • Strength and Weakness of Methods: Some methods are more secure than others. Simple passwords can be compromised more easily, while stronger or multi-layered authentication significantly improves security.
  • Why Choose the Right Method: The video emphasizes picking an authentication method appropriate for the sensitivity of the data or account being protected: stronger security for more sensitive information.

The Problem with Passwords: Passwords, even complicated ones, are not enough to prevent account takeover. A single phishing email or data breach can expose your password to the world. The Solution—Two Factors: Two-Factor Authentication (2FA) adds a second method of identity verification to secure your accounts. It combines: Something you know (Your password) Something you have (Something unique like your phone or fingerprint) How 2FA Protects You: By requiring both factors, attackers cannot access your account even if they manage to steal your password. Common 2FA Methods: The most common method uses a unique one-time code sent via text message or generated by a smartphone or token. The most modern and secure form uses a mobile app to send a simple approval notification to your smartphone or Smartwatch. Conclusion: Two-factor authentication is the most effective method of prevention, given that 95% of breaches involve account takeover. It is an easy and effective step that businesses, governments, and individuals should enable on all accounts.