USER
AUTHENTICATION
     Presented By : Robin
      Roll No.    :23188
Introduction to User
Authentication
• Verifying the identity of user is called as
  user authentication.
• User authentication verifies the identity and
  other credentials of a user who is
  attempting to gain access to computing
  resources or networks.
Three tasks under user authentication:
 Identification
 Authentication
 Authorization
The Role of Authentication
 Ensures authorized access
 Protects sensitive data
 Maintains user accountability
Common Authentication
Methods
   Single-Factor Authentication(SFA)
   Two-Factor Authentication(2FA)
   Multi-Factor Authentication(MFA)
     advantages of using multiple factors
Two-Factor Authentication(2FA)
 Security process that requires two forms of
  verification before granting access to an
  account.
 This involves something you know (like
  password) and something you have(like text
  message with a verification code).
 Methods of 2FA includes SMS codes,
  authenticator apps, biometric verification.
Multi-Factor
Authentication(MFA)
 Authentication method that requires two or
  more independent ways to identify a user.
 MFA increases the confidence of users by
  adding multiple layers of security.
 Example: Codes generated from the user’s
  smart phone, captcha tests, fingerprints,
  voice biometrics or facial recognition.
Types of Authentication
•   Password-Based Authentication
•   Biometric Authentication
      Examples: Fingerprints, facial recognition,
    retina patterns
•   Token-Based Authentication
     Smart cards, tokens
Password Authentication
 Passwords are most common methods of
  authentication.
 Passwords can be in the form of a string of
  letters, numbers, or special characters.
 User need to create strong passwords that
  include a combination of all possible options
  to prevent from phishing attacks.
Biometric Authentication
 Depends on the unique biological
  characteristics of an individual.
 Used by consumers, governments and
  private corporations including airports,
  military bases and national borders.
 Example:
• Facial recognition
• Fingerprint scanners
• Speaker recognition
• Eye scanners
Security Challenges
•   Phishing Attacks
•   Password Weakness
•   Brute Force Attacks: An attacker will try
    multiple usernames and passwords until
    they gain access to a valid account.
•   Social Engineering
•   Lack of Multi-Factor Authentication(MFA)
Best Practices for User
Authentication
 Use Strong Password Policies
 Implement Multi-Factor Authentication
 Limit Login Attempts
 Educate Users
 Session Management
THANK YOU