Trivia – Authentication
Trivia – Authentication
Hello all! Today we will discuss a trivia that is important in cyber security: authentication methods. In the previous weeks, our trivias are all related to network 😅 Today we will discuss a trivia that is not related to network, which is the general info about authentication.
Image source: https://swoopnow.com/user-authentication/
However,
before that, we will first identify the terms of identification,
authentication, and authorization in security. For the analogy to make it
easier to understand, we will use “login into an email account” as the use
case.
1.
Identification
is how the system identifies you or someone. For example, we typed the username
of the account, which is “John Doe”.
2.
Authentication
is how the system verifies that you are the one that it identifies in the
previous phase. For example, when we want to log in to John’s account, we need
to type the correct password.
3.
Authorization
is the system gives access to us because it already trusted our identity. For
example, after the login to John’s account is successful, we can access John’s email
because the system already authorized them to us.
Below are common
authentication types:
-
What
do you have? Example: smart card, mobile phone.
-
What
do you know? Example: password, pattern, PIN.
Image
source: https://id.wikipedia.org/wiki/Kata_sandi
-
Who
are you? Example: biometrics (fingerprint, retina scan).
Image source: https://cyberhoot.com/cybrary/biometrics/
Do you know
that fingerprint is more recommended to be used as biometrics security rather
than retina scan? The reason is that retina scan is easier to be spoofed.
Besides that, from a person eye, we can know some private information, such as
their diseases. Therefore, to ensure better privacy, fingerprint is more used
in the industry.
Additional Information
Besides the
three authentication methods that are shown above, there is another
authentication method that is not yet become a standard, but already used in
several platforms. That method is by using geolocation.
Using VPN
can only change the IP and country, but the user agent is still the same.
Hence, if there is another user agent with different IP and located in another
country, then you can conclude that your account is compromised. Besides that,
changing to a distant country in a short time will also make the application
suspect you, thereby prompting you to login again with your username and
password to verify your identity.






Comments
Post a Comment