
THE NECESSITY AND BENEFIT OF MULTI FACTOR AUTHENTICATION
Rajabboyeva Surayyo Baxrom qizi , Trainee-teacher of UbTUIT Xalmuratov Omonboy Utamuratovich , Deputy direktor of UbTUITAbstract
One of the safest authentication techniques is multifactor authentication (MFA). It includes a wide variety of subjects in a cyber-connected environment, including control of access rights, communications, and online payments. Due to the extra step the user must do, multifactor authentication is typically a little difficult. With two-factor authentication, in addition to the user ID and password, the user must also enter a unique code, often sent to them through SMS or one they have already obtained. This essay will discuss the idea of MFA, the main distinctions between MFA and two-factor authentication (2FA), the advantages of MFA, and the need of using it
Keywords
Security, Multi Factor, Authentication, Tokens, Security Protocols.
References
R. A. Grimes, Hacking Multifactor Authentication, John Wiley & Sons Inc., 2021.
“Why Multi-Factor Authentication (MFA) Is Important,” OKTA, [Online]. Available:
https://www.okta.com/ identity-101/why-mfa-is-everywhere/.
“What is multifactor authentication and how does it work?,” [Online]. Available: https://www.techtarget.com /searchsecurity/definition/multifactor-authentication-MFA.
“The Ultimate Chrome OS Guide For The Google Pixelbook Go,” [Online]. Available: https://books.google.com.sa/books?id=rrw6EAAAQBAJ&pg=PT139&dq=Multi+Factor+authentication+(MFA)&hl=en&sa=X&ved=2ahUKEwifpceW9eD1AhVDyxoKHeARCZ44FBDoAXoECAoQAg#v=onepage&q=Multi%20Factor%20authentication%20( MFA)&f=false.
“What is multi-factor authentication (MFA) and how does it work?,” SecurID, Oct 2021. [Online]. Available: https://www.securid.com/en-us/blog/what-is-mfa/.
“What are the Key Differences between 2FA and MFA?,” [Online]. Available: https://www.incognia.com/theauthentication-reference/what-are-the-key-differences-between-2fa-and-mfa.
A. C. S. S. M. M. Y. E. B. a. E. A. Bhargav-Spantzel, “Privacy preserving multi-factor authentication with biometrics,” Journal of Computer Security, vol. 15, pp. 529-560, 2007.
F. C. R. C. G. &. Z. N. Sinigaglia, “A survey on multi-factor authentication for online banking in the wild.,” Computers & Security, 2020. [9] a. A. K. T. Bazaz, “A review on single sign on enabling technologies and protocols,” International Journal of Computer Applications, vol. 151, no. 11, pp. 18-25, 2016
Article Statistics
Downloads
Copyright License

This work is licensed under a Creative Commons Attribution 4.0 International License.