Jericho Security | Glossary

Jericho's Cybersecurity Glossary | Authentication

Written by Jericho Security Team | Sep 27, 2024 9:42:52 PM

Definition:

Authentication is the process of verifying the identity of a user or device before granting access to a system, application, or network. Common methods include passwords, biometrics, and multi-factor authentication (MFA).

Use Cases:

  • Used in online banking and financial transactions to verify the identity of users.
  • Employed in corporate environments for secure access to internal systems and data.

Related Terms:

Questions and Answers:

  • What are the common methods of authentication?
    Common methods include passwords, biometrics (fingerprint or facial recognition), one-time passcodes, and multi-factor authentication. For greater security, we suggest combining two or more methods of authentication.

  • How does authentication differ from authorization?
    Authentication verifies the identity of a user, while authorization determines the level of access that authenticated users have.

  • Why is multi-factor authentication (MFA) important for security?
    MFA adds an extra layer of security by requiring multiple forms of verification, reducing the likelihood of unauthorized access due to compromised passwords. MFA can also be combined with techniques such as Account Lockout to fully prevent malicious attacks from succeeding.