Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Multifactor Authentication: Protecting Privacy in the Digital World

View through CrossRef
Abstract: In today’s world, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. With the rapid evolution of wireless communication technology, user authentication is essential to ensure the security of wireless communication technology. It assists humans to interact with everything by enabling services that are faster, user-friendly and reliable for authentication. As from conducted surveys, a common user may have multiple online accounts which requires passwords. As an evolution in wireless communication, the user authentication plays an important role. In the process of authentication, passwords plays an important role. Importance of MFA ensures the user’s account does not get easily attacked by the attackers and also ensures that the sensitive information of the user remains safe. The objective of the system outcome is to enhance the current login authentication system. It provides solutions for making password breaking more difficult as well as convinces users to create passwords that are hard to break. This research delves into the effectiveness of MFA in diverse contexts, including its role in preventing phishing attacks, enhancing security, and adapting to emerging threats. MFA goes beyond conventional password protection, requiring users to authenticate through a combination of knowledge-based factors (Passwords, Pins), possession- based factors(Tokens, Smart-phones), and inherence-based factors(Bio-metrics). This paper explores the concept of MFA, which means combining the various types of authentication factors to enhance user security.
International Journal for Research in Applied Science and Engineering Technology (IJRASET)
Title: Multifactor Authentication: Protecting Privacy in the Digital World
Description:
Abstract: In today’s world, digitalization decisively penetrates all the sides of the modern society.
One of the key enablers to maintain this process secure is authentication.
With the rapid evolution of wireless communication technology, user authentication is essential to ensure the security of wireless communication technology.
It assists humans to interact with everything by enabling services that are faster, user-friendly and reliable for authentication.
As from conducted surveys, a common user may have multiple online accounts which requires passwords.
As an evolution in wireless communication, the user authentication plays an important role.
In the process of authentication, passwords plays an important role.
Importance of MFA ensures the user’s account does not get easily attacked by the attackers and also ensures that the sensitive information of the user remains safe.
The objective of the system outcome is to enhance the current login authentication system.
It provides solutions for making password breaking more difficult as well as convinces users to create passwords that are hard to break.
This research delves into the effectiveness of MFA in diverse contexts, including its role in preventing phishing attacks, enhancing security, and adapting to emerging threats.
MFA goes beyond conventional password protection, requiring users to authenticate through a combination of knowledge-based factors (Passwords, Pins), possession- based factors(Tokens, Smart-phones), and inherence-based factors(Bio-metrics).
This paper explores the concept of MFA, which means combining the various types of authentication factors to enhance user security.

Related Results

Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Privacy and Security for Digital Health: Assessing Risks and Harms to Users
Electronic Health (e-Health), such as mobile health (mHealth) and Health Information Systems (HIS), benefits healthcare consumers and professionals. However, it also poses potentia...
Access Denied
Access Denied
Introduction As social-distancing mandates in response to COVID-19 restricted in-person data collection methods such as participant observation and interviews, researchers turned t...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
MULTIFACTOR AUTHENTICATION FOR ONLINE SHOPPING SYSTEM
MULTIFACTOR AUTHENTICATION FOR ONLINE SHOPPING SYSTEM
In this project, a multifactor authentication system was integrated with an online store. Digital and computer security are now crucial for safeguarding user data. One threat is sh...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...

Back to Top