Comparison

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

TABLE OF COMPARISON BETWEEN DIFFERENT FACTORS OF AUTHENTICATION

1 Factor 2 Factor 3 Factor 4 Factor


Authentication Authentication Authentication Authentication

Definition & Something You Something You Something You Somewhere You
Features Know – includes Have – includes all Are – includes any Are - This factor
passwords, PINs, items that are physical part of the human might not be as known
combinations, code objects, such as keys, body that can be as the ones already
words, or secret smart phones, smart offered for verification, mentioned. Somewhere
handshakes. Anything cards, USB drives, and such as fingerprints, you are is related to
that you can remember token devices. palm scanning, facial your location. One of
and then type, say, do, recognition, retina the most common
perform, or otherwise scans, iris scans, and methods of detecting a
recall when needed falls user’s location is via
voice verification.
into this category. Internet Protocol (IP)
addresses.
Methods Pin , Password Pre Generated Pass Fingerprint Location of user
codes, Phone Call Back, Authentication, Facial authentication.
Used
TOTP, and U2F Devices. Recognition Iris Scan
Voice Recognition.
Algorithm System Based HMAC RFC4226 Pattern Based Under Research
Algorithm
Used

Security Password can be Lost & Stolen Devices Threat by Active Privacy Issue
Risk & hacked from Phishing Attacks and Passive Cost of
system. A strong security Attackers and development and
Issues
code isn’t given to Privacy Issues. complexity.
your cell phone
provider.

You might also like