You are here
FAU Collections » FAU Research Repository » FAU Student Research » FAU Undergraduate Student Research
Multi-factor Authentication
- Date Issued:
- 2015
- Summary:
- An important authentication method is multi-factor authentication (MFA). Products such as Enterprise Office 365 are already using it, available for any user in Office 365 Midsize Business, Enterprise, Academic, and Nonprofit plans as well as the standalone versions of Exchange Online and SharePoint Online. The log-in verification feature is aimed at reducing users' vulnerability to online identity theft, phishing, and other scams by adding a second level of authentication to an account log-in. Twitter, Apple, PayPal, Google, Facebook, and other vendors already have implemented it. After correctly entering their username and password, users need to acknowledge a phone call, text message, or an app notification on their smartphone before they can gain access to their account. Two-factor authentication is the most common form of MFA and requires the use of two of the three authentication factors: Something only the user knows, something the user has, and something only the user is. In this work we will analyze some varieties, do UML models of their structure and dynamics, and compare MFA to other authentication approaches.
Title: | Multi-factor Authentication. |
231 views
48 downloads |
---|---|---|
Name(s): |
Callahan, Colin Fernandez, Eduardo B. College of Engineering and Computer Science |
|
Type of Resource: | text | |
Genre: | Poster | |
Date Issued: | 2015 | |
Publisher: | Florida Atlantic University Libraries: Digital Library | |
Physical Form: | ||
Extent: | 1 p. | |
Language(s): | English | |
Summary: | An important authentication method is multi-factor authentication (MFA). Products such as Enterprise Office 365 are already using it, available for any user in Office 365 Midsize Business, Enterprise, Academic, and Nonprofit plans as well as the standalone versions of Exchange Online and SharePoint Online. The log-in verification feature is aimed at reducing users' vulnerability to online identity theft, phishing, and other scams by adding a second level of authentication to an account log-in. Twitter, Apple, PayPal, Google, Facebook, and other vendors already have implemented it. After correctly entering their username and password, users need to acknowledge a phone call, text message, or an app notification on their smartphone before they can gain access to their account. Two-factor authentication is the most common form of MFA and requires the use of two of the three authentication factors: Something only the user knows, something the user has, and something only the user is. In this work we will analyze some varieties, do UML models of their structure and dynamics, and compare MFA to other authentication approaches. | |
Identifier: | FA00005179 (IID) | |
Subject(s): | College students --Research --United States. | |
Persistent Link to This Record: | http://purl.flvc.org/fau/fd/FA00005179 | |
Host Institution: | FAU |