A Method of Risk Assessment for Multi-Factor Authentication
نویسندگان
چکیده
User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication methods being used in various online environments, such as web portals, electronic transactions, financial services and e-government, to identify the characteristics and issues of such authentication methods in order to present a user authentication level system model suitable for different online services. The results of our method are confirmed through a risk assessment and we verify its safety using the testing method presented in OWASP and NIST SP800-63. Keywords—Multi-factor Authentication, PKI, User Authentication, Biometric Authentication
منابع مشابه
risk assessment by integration approach of FMEA and multi criteria decision-making in the interval valued fuzzy environment: case study hydraulic pump manufacturing industry
Abstract Background and aims: Nowadays with increasing global competition, companies apply several scientific methods to identify, assess and remove potential failures in production process. The main goal of this study was identification and analysis of potential failure modes in a hydraulic pump manufacturing company by using combination of interval valued fuzzy Analytic network process (IVF-...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملThe assessment of safety and health risk using multi-criteria evaluation technique and TOPSIS method in Ilam gas refinery
Background and Objective: This study was designed to assess the safety and health risk in Ilam gas refinery and evaluation of TOPSIS method performance in risk assessment. Materials and Methods: After identifying 955 hazards case, the risks were ranked separately in the health and safety sectors using criteria such as exposure level, severity and probability of the occurrence and use TOPSIS m...
متن کاملRisk Assessment of Investments with Fuzzy Efficiency Indicators for Oil and Gas Production Industry
In the process of investment decision making, next to financial indicators many other aspects of investment projects are increasingly often considered. This leads to the multi-criteria evaluation of a project. The advantage of multi-criteria methods is the ability to take into account all (not only financial) aspects of the attractiveness of an investment project. The selection of criteria of p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JIPS
دوره 7 شماره
صفحات -
تاریخ انتشار 2011