|Overview: Strong Authentication|
Verification of identity based on at least two independent verifications of knowledge, ownership and inherence.
What is Strong Authentication?
John Spacey, updated on July 23, 2023
Strong authentication is verification of identity that utilizes multiple-factors including at least two of the following:KnowledgeSomething the user knows that is difficult for others to guess or research such as a strong password. OwnershipSomething the user possesses that is difficult to replicate or tamper-with such as a smart card or device that generates time-synchronized tokens.InherenceA physical characteristic of the user. For example, authentication based on a user's voice.
More about information security:
If you enjoyed this page, please consider bookmarking Simplicable.
A list of authentication techniques and considerations.
An overview of password entropy.
The difference between identification and authorization.
A few examples of the difference between authentication and authorization.
The relationship between security and privacy.
An overview of technology hardening.
An overview of deep magic, a technology term.
An overview of defense In depth.A definition of encryption with examples.
A definition of canary trap with an example.
A definition of honeypot with examples.
A definition of security through obscurity with an example.
A definition of token with examples.
A definition of backdoor with examples.
TrendingThe most popular articles on Simplicable in the past day. Recent posts or updates on Simplicable.