On Data Protection Using Multi-Factor Authentication

12Citations
Citations of this article
91Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Multi-Factor Authentication (MFA) has been around for three decades and now authentication and security has taken priority in securing data. Cyber-attacks have become widely popular and successful because organizations are poorly prepared to handle cyber security operations. These organizations hold critical information about employees, customers and patients. Adding additional security methods like MFA makes it more difficult for attackers to successfully exfiltrate data and cause additional damage. The methods of MFA can be used in combination to successfully secure data and provide adequate authentication practices. In this paper, we discuss the implementations of MFA, privacy behind using more than one authentication method and also the security concerns related to MFA. We also reveal the flaws of MFA systems and discuss how these flaws can result in a security breach.

Cite

CITATION STYLE

APA

Henricks, A., & Kettani, H. (2019). On Data Protection Using Multi-Factor Authentication. In ACM International Conference Proceeding Series (pp. 1–4). Association for Computing Machinery. https://doi.org/10.1145/3394788.3394789

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free