Methods of Authentication
Click here or there to move to the next page!
Whiteboard Security. (2024, November 16). Authentication Methods In Cyber Security [Video]. https://youtu.be/4eJbbNRXFnY
Show Text Version
Next
Card
- What you have: Smart card
- Smart cards – embedded with a chip that is automatically recognized by an authenticating device.
- Proximity Reader - can sense a Smart Card or Key Fob without direct contact. Can even detect in a pocket or purse.
Back
Next
Certificate
- What you have: Certificate
- Certificate – servers use these to authenticate remotely such as with a browser. To use a certificate, the server owner must provide a 3rd party authority with documentation.
- Click on this lock in your browser bar to see the certificate info for a
website
Back
Next
Biometrics
- What you are: Part of your body
- Uses a measurable physical characteristic to verify identity BUT can be expensive to implement
- Fingerprint
- Retina scan
- Voice
- Typing speed
- What’s next?
Back
Next
Options for Biometric Authentication
Green: best Red: worst
Source: http://www.bromba.com/faq/biofaqe.htm
Back
Next
Two-Factor Authentication
Duo Security. (2016, June 2). What is Two-Factor Authentication? (2FA) [Video]. https://youtu.be/0mvCeNsTa1g?si=sZcHgodnyFLGnFrU
Show Text Version
Back
Next
Multi-Factor Authentication (MFA)
- What you have and know: Token, Phone, Device and password
- Uses more than one method of authentication to increase security
Token – A hardware device which changes a code, usually every 60 seconds. The code is known as a One Time Password (OTP): Since it is used only once it is the best protection against an intercepted password.
Back
Next
Stopping Password Attacks
#1: Strong passwords – it won’t be in a dictionary, and it takes too long to crack!
#2: Lockout after several unsuccessful login attempts *useful to stop all guessing methods
#3: Use Multi-Factor or Two-Factor AuthenticationEx: password + PIN to phone
Back
The video describes various authentication methods used in cybersecurity, the techniques systems use to confirm a user’s identity before granting access to data or services. It explains why authentication matters and how different methods offer different levels of protection.
- What is Authentication?: It’s the process of checking that someone really is who they claim to be. Without authentication, unauthorized users could gain access to protected resources.
- Common Methods Covered: The video covers multiple authentication methods. These may include passwords, multifactor authentication, and other security techniques (depending on system requirements).
- Strength and Weakness of Methods: Some methods are more secure than others. Simple passwords can be compromised more easily, while stronger or multi-layered authentication significantly improves security.
- Why Choose the Right Method: The video emphasizes picking an authentication method appropriate for the sensitivity of the data or account being protected: stronger security for more sensitive information.
The Problem with Passwords: Passwords, even complicated ones, are not enough to prevent account takeover. A single phishing email or data breach can expose your password to the world. The Solution—Two Factors: Two-Factor Authentication (2FA) adds a second method of identity verification to secure your accounts. It combines: Something you know (Your password) Something you have (Something unique like your phone or fingerprint) How 2FA Protects You: By requiring both factors, attackers cannot access your account even if they manage to steal your password. Common 2FA Methods: The most common method uses a unique one-time code sent via text message or generated by a smartphone or token. The most modern and secure form uses a mobile app to send a simple approval notification to your smartphone or Smartwatch. Conclusion: Two-factor authentication is the most effective method of prevention, given that 95% of breaches involve account takeover. It is an easy and effective step that businesses, governments, and individuals should enable on all accounts.
Module 3: Lesson 4 Sem B Methods of Authentication
Teaching and Learning
Created on October 7, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Fill in Blanks
View
Countdown
View
Stopwatch
View
Unpixelator
View
Break the Piñata
View
Bingo
View
Create a Secret Code
Explore all templates
Transcript
Methods of Authentication
Click here or there to move to the next page!
Whiteboard Security. (2024, November 16). Authentication Methods In Cyber Security [Video]. https://youtu.be/4eJbbNRXFnY
Show Text Version
Next
Card
Back
Next
Certificate
Back
Next
Biometrics
Back
Next
Options for Biometric Authentication
Green: best Red: worst
Source: http://www.bromba.com/faq/biofaqe.htm
Back
Next
Two-Factor Authentication
Duo Security. (2016, June 2). What is Two-Factor Authentication? (2FA) [Video]. https://youtu.be/0mvCeNsTa1g?si=sZcHgodnyFLGnFrU
Show Text Version
Back
Next
Multi-Factor Authentication (MFA)
- What you have and know: Token, Phone, Device and password
- Uses more than one method of authentication to increase security
Token – A hardware device which changes a code, usually every 60 seconds. The code is known as a One Time Password (OTP): Since it is used only once it is the best protection against an intercepted password.Back
Next
Stopping Password Attacks
#1: Strong passwords – it won’t be in a dictionary, and it takes too long to crack!
#2: Lockout after several unsuccessful login attempts *useful to stop all guessing methods
#3: Use Multi-Factor or Two-Factor AuthenticationEx: password + PIN to phone
Back
The video describes various authentication methods used in cybersecurity, the techniques systems use to confirm a user’s identity before granting access to data or services. It explains why authentication matters and how different methods offer different levels of protection.
The Problem with Passwords: Passwords, even complicated ones, are not enough to prevent account takeover. A single phishing email or data breach can expose your password to the world. The Solution—Two Factors: Two-Factor Authentication (2FA) adds a second method of identity verification to secure your accounts. It combines: Something you know (Your password) Something you have (Something unique like your phone or fingerprint) How 2FA Protects You: By requiring both factors, attackers cannot access your account even if they manage to steal your password. Common 2FA Methods: The most common method uses a unique one-time code sent via text message or generated by a smartphone or token. The most modern and secure form uses a mobile app to send a simple approval notification to your smartphone or Smartwatch. Conclusion: Two-factor authentication is the most effective method of prevention, given that 95% of breaches involve account takeover. It is an easy and effective step that businesses, governments, and individuals should enable on all accounts.