<p>The state of digital user authentication today is undeniably messy. Many users rely on hundreds of authenticators, including passwords, biometrics and cryptographic keys, to have their digital identity verified by devices, applications, services and other digital entities. Adding to the authentication mess are misunderstandings and misconceptions about the pros and cons of each method.</p>
<p>Let’s take a look at the most common digital authentication methods and explore why combining methods using <a href=”https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA”>MFA</a> helps achieve stronger authentication.</p>
<section class=”section main-article-chapter” data-menu-title=”Knowledge-based factors”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Knowledge-based factors</h2>
<p>Knowledge-based authentication methods involve something the user knows, such as a password, passphrase or PIN.</p>
<p>Passwords are sequences of characters that only one person should know or be able to retrieve. Types of passwords include PINs — short numeric passwords — and passphrases — <a href=”https://www.techtarget.com/searchsecurity/tip/How-to-create-a-strong-passphrase-with-examples”>long phrase-style, multiword passwords</a>. Pundits have proclaimed the impending death of passwords for a good 20 years because of their numerous weaknesses. While their use has begun to decline, passwords remain widely used.</p>
<p>Passwords deliver some important benefits. Most people are accustomed to passwords, so they require little or no training. Users who forget or lose their password can typically reset it rapidly and regain access regardless of where they are or what day or time it is. Plus, nearly every technology already supports password use, potentially making its use inexpensive and fast.</p>
<p>Passwords, however, do <a href=”https://www.techtarget.com/searchsecurity/tip/Top-5-password-hygiene-tips-and-best-practices”>have their weaknesses</a>. They can be guessed, <a href=”https://www.techtarget.com/searchsecurity/definition/password-cracker”>cracked</a>, <a href=”https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users”>phished</a> and intercepted. Attackers can then use stolen passwords to launch attacks. Also, password management, including password creation, storage, retrieval and especially memorization, is often a burden for users and organizations.</p>
<p>While passwords still play a valuable role in digital authentication, they are frequently compromised, and many users dislike them.</p>
</section>
<section class=”section main-article-chapter” data-menu-title=”Inherence-based factors”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Inherence-based factors</h2>
<p>Inherence-based methods include user features, such as biometric or behavioral authentication.</p>
<p><a href=”https://www.techtarget.com/searchsecurity/definition/biometrics”>Biometric characteristics</a>, including fingerprints, facial recognition, iris scans and voice recognition, have become increasingly common. Most laptops, smartphones and other devices available today have added native support for reading these characteristics. Behavioral authentication involves analyzing keystrokes or mouse movements to identify users.</p>
<p>A widespread misconception about biometrics is that they are a much stronger form of authentication than passwords. As <a target=”_blank” href=”https://pages.nist.gov/800-63-3/” rel=”noopener”>NIST’s Digital Identity Guidelines</a> explain, the major drawback of biometrics is that they aren’t necessarily secret. A user’s face, fingerprints and other biometric characteristics are visible to others and can potentially be stolen or replicated. For some, this raises concerns about <a href=”https://www.techtarget.com/searchsecurity/tip/In-biometrics-security-concerns-span-technical-legal-and-ethical”>privacy concerns</a>.</p>
<p>Biometrics and behavior-based factors are also susceptible to false positives and false negatives. While convenient, biometric authentication requires careful consideration of its <a href=”https://www.techtarget.com/searchsecurity/tip/Evaluate-biometric-authentication-pros-and-cons-implications”>pros and cons</a>.</p>
</section>
<section class=”section main-article-chapter” data-menu-title=”Possession-based factors”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Possession-based factors</h2>
<p>Possession-based methods are something the user has. Most involve cryptographic keys stored on a device. Once the system issue
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: