Set of technology-independent rules for controlling access to an object by a subject
Authentication factor
evidence used to prove the user's claim to an identity
Knowledge factor
something you know
PIN, password
Possession factor
Something you have
Smart card, mobile phone
Inherence factor
Something you are
fingerprints, voiceprints, retina, iris patterns
Location factor
Somewhere you are
Location like GPS, IP address
Behavior factor
Something you do
hand gesture,
Single-factor authentication
require a user's smart card or user's password
Two-factor authentication
Like password and verification code sent to a user's mobile phone
Multi-factor authentication (MFA)
Number of authentication
Greater number of authentication factor negatively impacts user experience and reduces system usability
Knowledge-based authentication
the method that requires knowledge of user's personal information to validate a user's claimed identity
Static KBA = Shared secrets
Based on pre-agreed set of shared questions between system and users
user's answers to a set of questions by authentication systems
Dynamic KBA
Based on knowledge questions complied from public and private information like credit report and historical of financial transactions
One-time password (OTP)
An authentication code that can only be used once
6-10 digit code
authentication system that deploys 2FA
OTP
Prevent a user sharing the user's password with another party from using the same password on multiple system
Remove the need for having complex password that difficult for user to remember
Can be generated by a software application or a hardware device or delivered to a user by email, short message, or phone call
OTP
Time-based one-time password (TOTP)
HMAC-based one-time password (HOTP)
TOTP
One time password that changes periodically
Generated using a timer and a secret key
A change in TOTP is based on an increment of time call TIMESTEP
is valid for tilmestep is between 30-180
HOTP
One time password that changes based on an event
Generated using a counter and a secret key
HOTP router is incremented by an event such as press of a button on an HOTP generator device
Valid until the HOTP is used or until a new HOTP is generated
Software-based OTP
An authentication application = software token
authentication application must be configured for used with an authentication server. The server send a secret key to the application -> the secret key is used by the application to generate OTPs for future authentications request to then server
Push notification
Notification sent by an authentication server to a mobile device associated with a user
informs a user of an authentication attempt
An attempt is approved if the user performs an action like pushing a Botton, opening an application
This uses a possession factor (User's phone) to validate the user's identity
Does not deliver an OTP
Seed
A secret key shared between an authentication server and a software token
hardware-based OTP
Security token = token key, security key or password key
Hardware device that generate an OTP
Security token has an encoded secret key that only shared with an authentication server
Security token does not store an OTP on a network device like mobile phone so it's more secure than authentication relies on SMS or email
Static code
a pre-generated OTP
Generated by both hardware or software-based OTP generator and saved on a secured storage media for later use
OTP
Is pregenerated and used when a hardware or software security token and a network connection does not exits
Hardware-based security
Hardware that can be authentication to ensure an unauthorized operation is not perform on data and systems