THE NECESSITY AND BENEFIT OF MULTI FACTOR AUTHENTICATION

Main Article Content

Rajabboyeva Surayyo Baxrom qizi
Xalmuratov Omonboy Utamuratovich

Abstract

One of the safest authentication techniques is multifactor authentication (MFA). It includes a wide variety of subjects in a cyber-connected environment, including control of access rights, communications, and online payments. Due to the extra step the user must do, multifactor authentication is typically a little difficult. With two-factor authentication, in addition to the user ID and password, the user must also enter a unique code, often sent to them through SMS or one they have already obtained. This essay will discuss the idea of MFA, the main distinctions between MFA and two-factor authentication (2FA), the advantages of MFA, and the need of using it

Downloads

Download data is not yet available.

Article Details

Section

Articles

How to Cite

THE NECESSITY AND BENEFIT OF MULTI FACTOR AUTHENTICATION. (2023). International Bulletin of Applied Science and Technology, 3(4), 960-964. https://researchcitations.com/index.php/ibast/article/view/1272

References

R. A. Grimes, Hacking Multifactor Authentication, John Wiley & Sons Inc., 2021.

“Why Multi-Factor Authentication (MFA) Is Important,” OKTA, [Online]. Available:

https://www.okta.com/ identity-101/why-mfa-is-everywhere/.

“What is multifactor authentication and how does it work?,” [Online]. Available: https://www.techtarget.com /searchsecurity/definition/multifactor-authentication-MFA.

“The Ultimate Chrome OS Guide For The Google Pixelbook Go,” [Online]. Available: https://books.google.com.sa/books?id=rrw6EAAAQBAJ&pg=PT139&dq=Multi+Factor+authentication+(MFA)&hl=en&sa=X&ved=2ahUKEwifpceW9eD1AhVDyxoKHeARCZ44FBDoAXoECAoQAg#v=onepage&q=Multi%20Factor%20authentication%20( MFA)&f=false.

“What is multi-factor authentication (MFA) and how does it work?,” SecurID, Oct 2021. [Online]. Available: https://www.securid.com/en-us/blog/what-is-mfa/.

“What are the Key Differences between 2FA and MFA?,” [Online]. Available: https://www.incognia.com/theauthentication-reference/what-are-the-key-differences-between-2fa-and-mfa.

A. C. S. S. M. M. Y. E. B. a. E. A. Bhargav-Spantzel, “Privacy preserving multi-factor authentication with biometrics,” Journal of Computer Security, vol. 15, pp. 529-560, 2007.

F. C. R. C. G. &. Z. N. Sinigaglia, “A survey on multi-factor authentication for online banking in the wild.,” Computers & Security, 2020. [9] a. A. K. T. Bazaz, “A review on single sign on enabling technologies and protocols,” International Journal of Computer Applications, vol. 151, no. 11, pp. 18-25, 2016

Similar Articles

You may also start an advanced similarity search for this article.