Share this
What is Multi-Factor Authentication (MFA), and How Does it Work?
by Christopher Trick on Feb 15, 2022 6:37:18 PM
As cyberattacks become increasingly sophisticated, traditional security methods such as requiring a username and password prove to be inadequate safeguards against unauthorized access.
In this blog, you'll learn the importance of multi-factor authentication and how it ensures maximum protection of a computing system.
What is multi-factor authentication?
Multi-factor authentication (MFA) is a security technology that requires at least two authentication methods from different types of credentials to verify a user's identity for a login or other transaction.
To be granted access, users need to provide information regarding what they know (i.e. a password), what they have (i.e. a security token), and what they are (i.e. facial recognition).
Currently, almost 60 percent of businesses worldwide use some form of multi-factor authentication.
The primary goal of MFA is to make it more difficult for unauthorized personnel to access a target--location, computer/system, network, or database--through creating multiple layers of defense.
If cybercriminals break through one layer, having MFA in place provides extra layers of protection before they can get to the object of interest.
Previously, multi-factor authentication systems mainly were built on two-factor authentication (TFA), meaning two layers of authentication are required before any action is authorized. Some examples include a password or PIN (personal identification number) on ATMs.
However, TFA proved to be ineffective as hackers found ways to access passwords and PINs, prompting companies and vendors to find stronger security methods.
More recently, the term multi-factor has been used to describe any authentication process requiring two or more credentials.
Why is multi-factor authentication important?
Traditional security practices like requiring a username and password prove to be increasingly weak protections against cyberattacks, potentially costing organizations millions of dollars. (The average cost of a data breach is said to be more than $4.2 million.)
Username and password combinations can easily be guessed, as cybercriminals use password cracking tools to try different usernames and passwords until they gain access.
And though many systems do lock users out after a certain number of incorrect attempts, there are other ways for hackers to gain access to a system.
Multi-factor authentication helps reduce the risk of attacks by providing extra layers of protection even if unauthorized personnel crack one of the layers.
Multi-factor authentication is also useful in securing operating systems and hypervisors.
What are some examples of multi-factor authentication?
Each credential used to verify a user's identity is called an authentication factor.
The purpose of requiring multiple credentials is to ensure that the entity trying to gain access is, in fact, who or what it says it is, making a hacker's job increasingly difficult.
There are three common authentication factors: knowledge, possession, and inherence.
Let's take a look at each in detail:
Knowledge factors
Knowledge factors are what an entity knows. Often, this is a code or the answer to a personal security question.
Some examples of knowledge factor technologies include passwords, four-digit PINs, or one-time passwords (OTPs).
Here are some situations in which a knowledge factor is required:
- You go to the grocery store and purchase an item with a debit card. Before the purchase is authorized, you need to enter a PIN.
- When you are trying to log into a CRM system or your bank account, they send you a one-time six-digit code to enter before you can access an account.
- When trying to access an investment account, you are asked to provide information to questions such as "What is your mother's maiden name?" or "What was the first concert you went to as a child?"
But this information can easily be guessed or stolen, which necessitates requiring other credentials before any entity gains access.
Four-digit PINs are used to further verify a user's identify before he or she is granted access to a system.
Possession factors
Possession factors are what an entity has, which they must present before accessing a system. These credentials can take the form of a badge, token, key fob, or phone subscriber identity module (SIM) card.
Some examples of possession factor technologies are:
- Security tokens, small hardware devices that store a user's personal information and electrically verify his or her identity. These can take the form of a smart chip, an embedded chip like a Universal Serial Bus (USB) drive, or a wireless tag.
- Software-based security token applications that generate a one-time login PIN. For mobile, soft tokens are used, in which the device itself provides the possession factor authentication.
Here are some situations in which a possession factor is required:
- When you receive a code via your smartphone to gain or grant access, also known as mobile authentication. This can take the form of text messages, phone calls, smartphone OTP apps, SIM cards, and smart cards with stored authentication.
- When you attach a USB drive to a computer and it generates an OTP for you to use to login.
Inherence factors
Inherence factors are any biological traits that an entity has that are needed for access. These credentials can take the form of fingerprints, facial features, or voice recognition.
Some examples of inherence factor technologies include retina or iris scans, fingerprint scans, voice authentication, hand geometry, digital signature scanners, facial recognition, or earlobe geometry.
A biometric device is needed to recognize these traits, composed of a reader, a database, and software to convert the scanned data into a standardized digital format and compare match points to the data already stored.
Here are some situations in which an inherence factor is required:
- When you use your smartphone, you are asked to scan your fingerprint or face before access is granted.
- You are asked to sign at checkout before the purchase is authorized when you go to a retail store and make a purchase with a debit card.
Other authentication factors
- User location is sometimes used, as most people carry their phones around with them, and the Global Positioning Feature (GPS) on a smartphone can help verify the login location. For instance, an employee who always carries his phone with him tried to log into his company's database in Lawrenceville, Georgia. It can be confirmed that it was, in fact, this person by locating him through the GPS feature on his phone.
- Time-based authentication is useful in detecting a person's presence at a specific time of day when a system was accessed. For instance, it's highly unlikely that someone in Tallapoosa, Georgia, could make a withdrawal from his bank account in Paris, France, 15 minutes later.
What are the pros and cons of multi-factor authentication?
Though multi-factor authentication has many upsides, there are some downsides, too.
Let's take a look at the pros:
- It strengthens security at the hardware, software, and personal identification levels.
- It uses one-time passwords or codes sent to phones in real-time, making it very difficult for hackers to gain access.
- It reduces data breaches by more than 99 percent.
- It is easy for users to set up.
- It gives businesses the option to restrict access through the filters of day or location.
Let's take a look at the cons:
- To get a code, you need to have access to a phone.
- Hardware tokens can be lost or stolen.
- Your phone can also be lost or stolen.
- Sometimes biometric data like thumbprints are not always accurate and can create false positives and negatives.
- If there is a network or internet outage, verification can fail.
- Verification techniques constantly need to be updated to protect against cybercriminals.
Are there any improvements to make with multi-factor authentication?
Each additional security factor to multi-factor authentication makes it more difficult to navigate for users who need to remember multiple passwords.
So, it is important to simplify MFA for users.
Here are three solutions:
- Adaptive MFA: This means knowledge, business rules, or policies are applied based on factors such as a user's device or location. For instance, a company's virtual private network (VPN) allows a user to sign on from home because it can assess the risk of misuse or compromise. If a user tries to access the network from a deli, the system will be triggered, and the user will be asked to provide MFA credentials.
- Single sign-on (SSO): This means that users can be logged into multiple applications or websites with a single ID and password, as the user's identity is established by the first login and then shared with the applications. For instance, once someone logs into Google Drive, they are automatically logged into other Google applications they have, such as Gmail, Docs, and Sheets.
- Push authentication: This is an automated mobile authentication technique where the security system issues a third, one-time identification code to the user's mobile device, so users are not stuck with remembering it. For instance, users will need to enter a username and password to access a secure system. The security system will automatically issue a third, single-use identification code to their mobile device. This code will be the final barrier to access.
Conclusion
As cybercriminals become more advanced in their methods, security measures must evolve to protect against such threats.
Additionally, single-layer security tactics are proving to be relatively ineffective, as usernames and passwords can easily be guessed using various tools and tactics.
Though imperfect, multi-factor authentication provides additional layers of system hardening to protect critical data and thwart hacker attacks.
At Trenton Systems, our engineers spend countless hours perfecting multi-layer cybersecurity options, including multi-factor authentication, to provide complete protection across the hardware, firmware, and software layer stack.
With Next-Gen encryption and the latest cybersecurity technologies, our high-performance compute solutions help prevent unauthorized access to ensure optimal performance across all domains of the modern battlespace, no matter where the mission leads.
Sources:
Share this
- High-performance computers (42)
- Military computers (38)
- Rugged computers (32)
- Cybersecurity (25)
- Industrial computers (25)
- Military servers (24)
- MIL-SPEC (20)
- Rugged servers (19)
- Press Release (17)
- Industrial servers (16)
- MIL-STD-810 (16)
- 5G Technology (14)
- Intel (13)
- Rack mount servers (12)
- processing (12)
- Computer hardware (11)
- Edge computing (11)
- Rugged workstations (11)
- Made in USA (10)
- Partnerships (9)
- Rugged computing (9)
- Sales, Marketing, and Business Development (9)
- Trenton Systems (9)
- networking (9)
- Peripheral Component Interconnect Express (PCIe) (7)
- Encryption (6)
- Federal Information Processing Standards (FIPS) (6)
- GPUs (6)
- IPU (6)
- Joint All-Domain Command and Control (JADC2) (6)
- Server motherboards (6)
- artificial intelligence (6)
- Computer stress tests (5)
- Cross domain solutions (5)
- Mission-critical servers (5)
- Rugged mini PCs (5)
- AI (4)
- BIOS (4)
- CPU (4)
- Defense (4)
- Military primes (4)
- Mission-critical systems (4)
- Platform Firmware Resilience (PFR) (4)
- Rugged blade servers (4)
- containerization (4)
- data protection (4)
- virtualization (4)
- Counterfeit electronic parts (3)
- DO-160 (3)
- Edge servers (3)
- Firmware (3)
- HPC (3)
- Just a Bunch of Disks (JBOD) (3)
- Leadership (3)
- Navy (3)
- O-RAN (3)
- RAID (3)
- RAM (3)
- Revision control (3)
- Ruggedization (3)
- SATCOM (3)
- Storage servers (3)
- Supply chain (3)
- Tactical Advanced Computer (TAC) (3)
- Wide-temp computers (3)
- computers made in the USA (3)
- data transfer (3)
- deep learning (3)
- embedded computers (3)
- embedded systems (3)
- firmware security (3)
- machine learning (3)
- Automatic test equipment (ATE) (2)
- C6ISR (2)
- COTS (2)
- COVID-19 (2)
- Compliance (2)
- Compute Express Link (CXL) (2)
- Computer networking (2)
- Controlled Unclassified Information (CUI) (2)
- DDR (2)
- DDR4 (2)
- DPU (2)
- Dual CPU motherboards (2)
- EW (2)
- I/O (2)
- Military standards (2)
- NVIDIA (2)
- NVMe SSDs (2)
- PCIe (2)
- PCIe 4.0 (2)
- PCIe 5.0 (2)
- RAN (2)
- SIGINT (2)
- SWaP-C (2)
- Software Guard Extensions (SGX) (2)
- Submarines (2)
- Supply chain security (2)
- TAA compliance (2)
- airborne (2)
- as9100d (2)
- chassis (2)
- data diode (2)
- end-to-end solution (2)
- hardware security (2)
- hardware virtualization (2)
- integrated combat system (2)
- manufacturing reps (2)
- memory (2)
- mission computers (2)
- private 5G (2)
- protection (2)
- secure by design (2)
- small form factor (2)
- software security (2)
- vRAN (2)
- zero trust (2)
- zero trust architecture (2)
- 3U BAM Server (1)
- 4G (1)
- 4U (1)
- 5G Frequencies (1)
- 5G Frequency Bands (1)
- AI/ML/DL (1)
- Access CDS (1)
- Aegis Combat System (1)
- Armed Forces (1)
- Asymmetric encryption (1)
- C-RAN (1)
- COMINT (1)
- CPUs (1)
- Cloud-based CDS (1)
- Coast Guard (1)
- Compliance testing (1)
- Computer life cycle (1)
- Containers (1)
- D-RAN (1)
- DART (1)
- DDR5 (1)
- DMEA (1)
- Data Center Modular Hardware System (DC-MHS) (1)
- Data Plane Development Kit (DPDK) (1)
- Defense Advanced Research Projects (DARP) (1)
- ELINT (1)
- EMI (1)
- EO/IR (1)
- Electromagnetic Interference (1)
- Electronic Warfare (EW) (1)
- FIPS 140-2 (1)
- FIPS 140-3 (1)
- Field Programmable Gate Array (FPGA) (1)
- Ground Control Stations (GCS) (1)
- Hardware-based CDS (1)
- Hybrid CDS (1)
- IES.5G (1)
- ION Mini PC (1)
- IP Ratings (1)
- IPMI (1)
- Industrial Internet of Things (IIoT) (1)
- Industry news (1)
- Integrated Base Defense (IBD) (1)
- LAN ports (1)
- LTE (1)
- Life cycle management (1)
- Lockheed Martin (1)
- MIL-S-901 (1)
- MIL-STD-167-1 (1)
- MIL-STD-461 (1)
- MIL-STD-464 (1)
- MOSA (1)
- Multi-Access Edge Computing (1)
- NASA (1)
- NIC (1)
- NIC Card (1)
- NVMe (1)
- O-RAN compliant (1)
- Oil and Gas (1)
- Open Compute Project (OCP) (1)
- OpenRAN (1)
- P4 (1)
- PCIe card (1)
- PCIe lane (1)
- PCIe slot (1)
- Precision timestamping (1)
- Product life cycle (1)
- ROM (1)
- Raytheon (1)
- Remotely piloted aircraft (RPA) (1)
- Rugged computing glossary (1)
- SEDs (1)
- SIM Card (1)
- Secure boot (1)
- Sensor Open Systems Architecture (SOSA) (1)
- Small form-factor pluggable (SFP) (1)
- Smart Edge (1)
- Smart NIC (1)
- SmartNIC (1)
- Software-based CDS (1)
- Symmetric encryption (1)
- System hardening (1)
- System hardening best practices (1)
- TME (1)
- Tech Partners (1)
- Total Memory Encryption (TME) (1)
- Transfer CDS (1)
- USB ports (1)
- VMEbus International Trade Association (VITA) (1)
- Vertical Lift Consortium (VLC) (1)
- Virtual machines (1)
- What are embedded systems? (1)
- Wired access backhaul (1)
- Wireless access backhaul (1)
- accredidation (1)
- aerospace (1)
- air gaps (1)
- airborne computers (1)
- asteroid (1)
- authentication (1)
- autonomous (1)
- certification (1)
- cognitive software-defined radios (CDRS) (1)
- command and control (C2) (1)
- communications (1)
- cores (1)
- custom (1)
- customer service (1)
- customer support (1)
- data linking (1)
- data recording (1)
- ethernet (1)
- full disk encryption (1)
- hardware monitoring (1)
- heat sink (1)
- hypervisor (1)
- in-house technical support (1)
- input (1)
- integrated edge solution (1)
- international business (1)
- licensed spectrum (1)
- liquid cooling (1)
- mCOTS (1)
- microelectronics (1)
- missile defense (1)
- mixed criticality (1)
- moving (1)
- multi-factor authentication (1)
- network slicing (1)
- neural networks (1)
- new headquarters (1)
- next generation interceptor (1)
- non-volatile memory (1)
- operating system (1)
- output (1)
- outsourced technical support (1)
- post-boot (1)
- pre-boot (1)
- private networks (1)
- public networks (1)
- radio access network (RAN) (1)
- reconnaissance (1)
- secure flash (1)
- security (1)
- self-encrypting drives (SEDs) (1)
- sff (1)
- software (1)
- software-defined radios (SDRs) (1)
- speeds and feeds (1)
- standalone (1)
- storage (1)
- systems (1)
- tactical wide area networks (1)
- technical support (1)
- technology (1)
- third-party motherboards (1)
- troposcatter communication (1)
- unlicensed spectrum (1)
- volatile memory (1)
- vpx (1)
- zero trust network (1)
- November 2024 (1)
- October 2024 (1)
- August 2024 (1)
- July 2024 (1)
- May 2024 (1)
- April 2024 (3)
- February 2024 (1)
- November 2023 (1)
- October 2023 (1)
- July 2023 (1)
- June 2023 (3)
- May 2023 (7)
- April 2023 (5)
- March 2023 (7)
- December 2022 (2)
- November 2022 (6)
- October 2022 (7)
- September 2022 (8)
- August 2022 (3)
- July 2022 (4)
- June 2022 (13)
- May 2022 (10)
- April 2022 (4)
- March 2022 (11)
- February 2022 (4)
- January 2022 (4)
- December 2021 (1)
- November 2021 (4)
- September 2021 (2)
- August 2021 (1)
- July 2021 (2)
- June 2021 (3)
- May 2021 (4)
- April 2021 (3)
- March 2021 (3)
- February 2021 (8)
- January 2021 (4)
- December 2020 (5)
- November 2020 (5)
- October 2020 (4)
- September 2020 (4)
- August 2020 (6)
- July 2020 (9)
- June 2020 (11)
- May 2020 (13)
- April 2020 (8)
- February 2020 (1)
- January 2020 (1)
- October 2019 (1)
- August 2019 (2)
- July 2019 (2)
- March 2019 (1)
- January 2019 (2)
- December 2018 (1)
- November 2018 (2)
- October 2018 (5)
- September 2018 (3)
- July 2018 (1)
- April 2018 (2)
- March 2018 (1)
- February 2018 (9)
- January 2018 (27)
- December 2017 (1)
- November 2017 (2)
- October 2017 (3)
Comments (2)