THE NECESSITY AND BENEFIT OF MULTI FACTOR AUTHENTICATION

Authors

  • Rajabboyeva Surayyo Baxrom qizi Trainee-teacher of UbTUIT
  • Xalmuratov Omonboy Utamuratovich Deputy direktor of UbTUIT

Keywords:

Security, Multi Factor, Authentication, Tokens, Security Protocols.

Abstract

One of the safest authentication techniques is multifactor authentication (MFA). It includes a wide variety of subjects in a cyber-connected environment, including control of access rights, communications, and online payments. Due to the extra step the user must do, multifactor authentication is typically a little difficult. With two-factor authentication, in addition to the user ID and password, the user must also enter a unique code, often sent to them through SMS or one they have already obtained. This essay will discuss the idea of MFA, the main distinctions between MFA and two-factor authentication (2FA), the advantages of MFA, and the need of using it

Downloads

Download data is not yet available.

References

R. A. Grimes, Hacking Multifactor Authentication, John Wiley & Sons Inc., 2021.

“Why Multi-Factor Authentication (MFA) Is Important,” OKTA, [Online]. Available:

https://www.okta.com/ identity-101/why-mfa-is-everywhere/.

“What is multifactor authentication and how does it work?,” [Online]. Available: https://www.techtarget.com /searchsecurity/definition/multifactor-authentication-MFA.

“The Ultimate Chrome OS Guide For The Google Pixelbook Go,” [Online]. Available: https://books.google.com.sa/books?id=rrw6EAAAQBAJ&pg=PT139&dq=Multi+Factor+authentication+(MFA)&hl=en&sa=X&ved=2ahUKEwifpceW9eD1AhVDyxoKHeARCZ44FBDoAXoECAoQAg#v=onepage&q=Multi%20Factor%20authentication%20( MFA)&f=false.

“What is multi-factor authentication (MFA) and how does it work?,” SecurID, Oct 2021. [Online]. Available: https://www.securid.com/en-us/blog/what-is-mfa/.

“What are the Key Differences between 2FA and MFA?,” [Online]. Available: https://www.incognia.com/theauthentication-reference/what-are-the-key-differences-between-2fa-and-mfa.

A. C. S. S. M. M. Y. E. B. a. E. A. Bhargav-Spantzel, “Privacy preserving multi-factor authentication with biometrics,” Journal of Computer Security, vol. 15, pp. 529-560, 2007.

F. C. R. C. G. &. Z. N. Sinigaglia, “A survey on multi-factor authentication for online banking in the wild.,” Computers & Security, 2020. [9] a. A. K. T. Bazaz, “A review on single sign on enabling technologies and protocols,” International Journal of Computer Applications, vol. 151, no. 11, pp. 18-25, 2016

Downloads

Published

2023-04-29

How to Cite

THE NECESSITY AND BENEFIT OF MULTI FACTOR AUTHENTICATION. (2023). International Bulletin of Applied Science and Technology, 3(4), 960-964. https://researchcitations.com/index.php/ibast/article/view/1272

Similar Articles

21-30 of 276

You may also start an advanced similarity search for this article.