Multi-Factor Authentication (MFA) has been around for three decades and now authentication and security has taken priority in securing data. Cyber-attacks have become widely popular and successful because organizations are poorly prepared to handle cyber security operations. These organizations hold critical information about employees, customers and patients. Adding additional security methods like MFA makes it more difficult for attackers to successfully exfiltrate data and cause additional damage. The methods of MFA can be used in combination to successfully secure data and provide adequate authentication practices. In this paper, we discuss the implementations of MFA, privacy behind using more than one authentication method and also the security concerns related to MFA. We also reveal the flaws of MFA systems and discuss how these flaws can result in a security breach.
CITATION STYLE
Henricks, A., & Kettani, H. (2019). On Data Protection Using Multi-Factor Authentication. In ACM International Conference Proceeding Series (pp. 1–4). Association for Computing Machinery. https://doi.org/10.1145/3394788.3394789
Mendeley helps you to discover research relevant for your work.