To search, Click below search items.

 

All Published Papers Search Service

Title

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

Author

Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali

Citation

Vol. 21  No. 7  pp. 119-124

Abstract

Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

Keywords

Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.

URL

http://paper.ijcsns.org/07_book/202107/20210715.pdf