0% found this document useful (0 votes)
75 views7 pages

Multi-Factor Authentication vs Phishing

This study aims to critically assess how effective multi-factor authentication is at preventing phishing attacks. It will examine various MFA methods and technologies, and evaluate their individual and combined effectiveness against phishing through case studies and research. The study seeks to provide a thorough understanding of MFA's role in cybersecurity and suggest improvements to help combat evolving cyber threats.

Uploaded by

Marvin Itolondo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views7 pages

Multi-Factor Authentication vs Phishing

This study aims to critically assess how effective multi-factor authentication is at preventing phishing attacks. It will examine various MFA methods and technologies, and evaluate their individual and combined effectiveness against phishing through case studies and research. The study seeks to provide a thorough understanding of MFA's role in cybersecurity and suggest improvements to help combat evolving cyber threats.

Uploaded by

Marvin Itolondo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Phase 1

Abdirahman Ismail
BAS–490
Professor Calvin
10/20/2023
Introduction

Significant security concerns have been raised in the modern period due to the

widespread use of digital channels and our growing reliance on them. The dawn of the digital

age has brought with it an explosion of new ideas and connections, but it has also left us

vulnerable to cyberattacks. In particular, phishing assaults have spread like wildfire throughout

the cybercrime landscape. Phishing attacks, which deliberately mislead users in order to steal

their personal information, are a serious problem for online safety. They pose a significant risk of

monetary and public-image loss as well as privacy violations. These assaults highlight the need

for a more robust security solution by highlighting the weakness of existing single-factor

authentication techniques like usernames and passwords. Multi-Factor Authentication (MFA) has

been widely adopted by the cybersecurity industry as a more reliable security solution to this

problem (Gill & Jones, 2016). Since MFA requires numerous forms of verification before

allowing access, it serves as a strong deterrent against hacking attempts (Libicki, 2011). The

purpose of this study is to evaluate how well MFA protects users from the increasingly

sophisticated phishing assaults. This research project examines MFA methods, from hardware

tokens to biometrics, to determine their phishing prevention efficacy. MFA's efficacy in

combating phishing attacks is also explored via case studies (Cassidy & Manor, 2016). This

paper seeks to illuminate MFA's role in current cybersecurity and provide ways to improve MFA

systems to combat fraudsters' ever-changing strategies.


Statement of Purpose

This study's primary goal is critically assess how well multi-factor authentication works

to stop phishing assaults. Understanding how MFA improves security and its possible drawbacks

and weaknesses is crucial as cyber threats develop. This study will examine the various MFA

elements and kinds, such as hardware tokens and biometrics, and evaluate the individual and

combined effectiveness against phishing attacks. The study will also take into account actual

case studies and situations when MFA was put to the test against phishing assaults, learning from

both its triumphs and failures. By doing this, the study hopes to offer a thorough knowledge of

MFA's function in the current cybersecurity context. The study will also suggest improving MFA

systems to remain effective against fraudsters' ever-evolving strategies. With the help of this

investigation, the research hopes to add to the ongoing conversation about cybersecurity by

offering helpful information to technical specialists and the general public.

Literature Review

Phishing assaults are still a constant danger for e-service systems. This paper proposes a

multifactor authentication strategy designed to thwart phishing attempts in e-service platforms,

emphasizing the setting of Bangladesh. The difficulties of implementing cost-effective

authentication techniques while retaining a high level of security are highlighted by Zahid Hasan

et al. (2019). The suggested architecture intends to significantly lower the danger of phishing

attacks and increase user confidence in e-service systems by incorporating numerous verification

stages. In order to create multifactor authentication, three components were used: a user ID, a

protected image with a description, and a one-time password. The survey shows that the

suggested multifactor authentication approach outperforms the conventional two-factor

authentication model by 59% overall, including 64% points for non-technical users and 55% for
technical users. User satisfaction was attained since the model mirrored the user's outcomes and

suggestions.

The demand for more secure authentication techniques increases as the digital

environment changes. Ometov et al. (2018) go in-depth on the subject of multifactor

authentication, covering its many elements and the difficulties of putting them into practice. The

author explains how well MFA works against various cyber risks, including spoofing assaults. It

also clarifies the possible weaknesses of MFA and provides suggestions for improving it.

Phishing assaults still present severe risks to internet users. Zahid Hasan et al.'s (2019)

investigation of several defenses against phishing. The study highlights the possibility of

consumer education as a preventive approach in addition to technology solutions. Organizations

and individuals can be better prepared to defend themselves against phishing attacks by being

aware of the advantages and disadvantages of various solutions. According to the data, eight

different categories may be used to group together the anti-phishing techniques that are now

widely used online. Additionally, all of the therapies that have been suggested thus far are

preventative. Convolutional neural networks (CNN) and deep learning have opened up new

possibilities for authentication systems. Sajjad et al. (2019) present a unique MFA system that

uses CNN to combat spoofing. The suggested system is intended to be reliable and effective at

confirming users' identities, making it incredibly resistant to spoofing assaults. The study

demonstrates the potential of contemporary AI technology in strengthening cybersecurity

measures by using deep learning techniques.

Conventional authentication techniques are vulnerable to different security flaws, notably

text-based passwords. Carrillo-Torres et al. (2023) put out a novel MFA method that combines

picture recognition with user-established relationships. The distinctiveness of this strategy


resides in its two-factor authentication procedure, which requires users to first recognize specific

photos from a randomly chosen collection before concluding an authentication by establishing a

pre-configured link between two provided images. The study highlights the algorithm's precision

and usability, establishing it as a competitive alternative to more widely used MFA techniques.

An innovative solution that combines a mobile app with a camera is presented by Jindal

and Misra (2020) in their search for more secure authentication techniques. Due to the proposed

MFA method, users can authenticate without using tokens or conventional passwords. Instead,

users authenticate a webcam picture given to the smartphone via push notification after scanning

a QR code that was dynamically produced using a smartphone app. The study emphasizes how

automated the scheme requires and how little human participation it requires, pointing to its

potential as a safe and convenient authentication technique.

Financial transactions have changed due to mobile money applications, particularly in

areas with weak banking infrastructure. It is essential to guarantee the security of these

transactions. A multi-factor authentication technique tailored exclusively for mobile money

applications was suggested by Ali et al. in 2021. The technique combines a PIN, an OTP, and a

biometric fingerprint for improved security during mobile money authentication. The study

emphasizes the algorithm's effectiveness and security, highlighting its potential to protect

financial transactions in the digital era.

Conclusion

The quick development of the digital world has created both possibilities and difficulties.

Cyber dangers are becoming more sophisticated and frequent as we become more dependent on

internet platforms. Phishing attacks have become a significant worry among these dangers since
they may result in unauthorized access, possible data breaches, and considerable financial and

reputational harm. The inadequacy of conventional authentication techniques against these

sophisticated assaults makes it necessary to investigate and implement more vital security

solutions like multi-factor authentication (MFA). The examined literature emphasizes MFA's

role in enhancing online security, and numerous research studies have introduced cutting-edge

methods and algorithms to maximize its efficiency. The research environment is rife with

potential answers, from Elliptic Curve Cryptography to picture recognition and user-established

interactions. Researchers, technologists, and policymakers must keep up with the latest

advancements in cyber dangers to maintain our digital systems' security, reliability, and usability.

Reference:

Ali, G., Dida, M. A., & Elikana Sam, A. (2021, November 25). A Secure and Efficient Multi-
Factor Authentication Algorithm for Mobile Money Applications. Future Internet,
13(12), 299. https://doi.org/10.3390/fi13120299

Carrillo-Torres, D., Pérez-Díaz, J. A., Cantoral-Ceballos, J. A., & Vargas-Rosales, C. (2023,


January 20). A Novel Multi-Factor Authentication Algorithm Based on Image
Recognition and User Established Relations. Applied Sciences, 13(3), 1374.
https://doi.org/10.3390/app13031374

Ashibani, Y., & Mahmoud, Q. H. (2020). A Multi-Feature User Authentication Model Based on
Mobile App Interactions. IEEE Access, 8, 96322–96339.
https://doi.org/10.1109/access.2020.2996233

Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018,
January 5). Multi-Factor Authentication: A Survey. Cryptography, 2(1), 1.
https://doi.org/10.3390/cryptography2010001

Purkait, S. (2012, November 23). Phishing counter measures and their effectiveness – literature
review. Information Management & Computer Security, 20(5), 382–420.
https://doi.org/10.1108/09685221211286548

Sajjad, M., Khan, S., Hussain, T., Muhammad, K., Sangaiah, A. K., Castiglione, A., Esposito, C.,
& Baik, S. W. (2019, September). CNN-based anti-spoofing two-tier multi-factor
authentication system. Pattern Recognition Letters, 126, 123–131.
https://doi.org/10.1016/j.patrec.2018.02.015

Sajjad, M., Khan, S., Hussain, T., Muhammad, K., Sangaiah, A. K., Castiglione, A., Esposito, C.,
& Baik, S. W. (2019, September). CNN-based anti-spoofing two-tier multi-factor
authentication system. Pattern Recognition Letters, 126, 123–131.
https://doi.org/10.1016/j.patrec.2018.02.015

Sun, J., Lenz, D., Yu, H., & Peterka, T. (2023, October 10). MFA-DVR: direct volume rendering
of MFA models. Journal of Visualization. https://doi.org/10.1007/s12650-023-00946-y

Gerholz, K. H., Ciolek, S., & Wagner, A. C. (2020, September 30). Digital design of design
processes – A case study of a design research study in vocational education. EDeR.
Educational Design Research, 4(1). https://doi.org/10.15460/eder.4.1.1452

Zhang, X., & Cai, W. (2018, October 6). BDS four frequency carrier phase combination models
and their characteristics. Survey Review, 52(371), 97–106.
https://doi.org/10.1080/00396265.2018.1527088

Hwang, S., Nam, T., & Ha, H. (2021, July 3). From evidence-based policy making to data-driven
administration: proposing the data vs. value framework. International Review of Public
Administration, 26(3), 291–307. https://doi.org/10.1080/12294659.2021.1974176

Gill, G., & Jones, J. (2016). MULTI-FACTOR AUTHENTICATION AT JAGGED PEAK.


Journal of Information Technology Education: Discussion Cases, 5, 05.
https://doi.org/10.28945/3597

Cassidy, J., & Manor, I. (2016, May 26). Crafting strategic MFA communication policies during
times of political crisis: a note to MFA policy makers. Global Affairs, 2(3), 331–343.
https://doi.org/10.1080/23340460.2016.1239377

Libicki, M. C. (2011, January 1). Influences on the Adoption of Multifactor Authentication.


RAND Corporation.

You might also like