To search, Click
below search items.
|
|

All
Published Papers Search Service
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
A Survey on 5G Enabled Multi-Access Edge Computing for Smart Cities: Issues and Future Prospects
|
Author
|
Ali Tufail, Abdallah Namoun, Ahmed Alrehaili, Arshad Ali
|
Citation |
Vol. 21 No. 7 pp. 107-118
|
Abstract
|
The deployment of 5G is in full swing, with a significant yearly growth in the data traffic expected to reach 26% by the year and data consumption to reach 122 EB per month by 2022 [10]. In parallel, the idea of smart cities has been implemented by various governments and private organizations. One of the main objectives of 5G deployment is to help develop and realize smart cities. 5G can support the enhanced data delivery requirements and the mass connection requirements of a smart city environment. However, for specific high-demanding applications like tactile Internet, transportation, and augmented reality, the cloud-based 5G infrastructure cannot deliver the required quality of services. We suggest using multi-access edge computing (MEC) technology for smart cities' environments to provide the necessary support. In cloud computing, the dependency on a central server for computation and storage adds extra cost in terms of higher latency. We present a few scenarios to demonstrate how the MEC, with its distributed architecture and closer proximity to the end nodes can significantly improve the quality of services by reducing the latency. This paper has surveyed the existing work in MEC for 5G and highlights various challenges and opportunities. Moreover, we propose a unique framework based on the use of MEC for 5G in a smart city environment. This framework works at multiple levels, where each level has its own defined functionalities. The proposed framework uses the MEC and introduces edge-sub levels to keep the computing infrastructure much closer to the end nodes.
|
Keywords
|
Fog Computing; MEC; Cloud Computing;5G Smart City, Issues, Opportunities.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
A Survey on 5G Enabled Multi-Access Edge Computing for Smart Cities: Issues and Future Prospects
|
Author
|
Ali Tufail, Abdallah Namoun, Ahmed Alrehaili, Arshad Ali
|
Citation |
Vol. 21 No. 7 pp. 107-118
|
Abstract
|
The deployment of 5G is in full swing, with a significant yearly growth in the data traffic expected to reach 26% by the year and data consumption to reach 122 EB per month by 2022 [10]. In parallel, the idea of smart cities has been implemented by various governments and private organizations. One of the main objectives of 5G deployment is to help develop and realize smart cities. 5G can support the enhanced data delivery requirements and the mass connection requirements of a smart city environment. However, for specific high-demanding applications like tactile Internet, transportation, and augmented reality, the cloud-based 5G infrastructure cannot deliver the required quality of services. We suggest using multi-access edge computing (MEC) technology for smart cities' environments to provide the necessary support. In cloud computing, the dependency on a central server for computation and storage adds extra cost in terms of higher latency. We present a few scenarios to demonstrate how the MEC, with its distributed architecture and closer proximity to the end nodes can significantly improve the quality of services by reducing the latency. This paper has surveyed the existing work in MEC for 5G and highlights various challenges and opportunities. Moreover, we propose a unique framework based on the use of MEC for 5G in a smart city environment. This framework works at multiple levels, where each level has its own defined functionalities. The proposed framework uses the MEC and introduces edge-sub levels to keep the computing infrastructure much closer to the end nodes.
|
Keywords
|
Fog Computing; MEC; Cloud Computing;5G Smart City, Issues, Opportunities.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|
Title
|
Access Management Using Knowledge Based Multi
Factor Authentication In Information Security
|
Author
|
Engr. Umar Iftikhar, Engr. Kashif Asrar, Engr. Dr. Maria Waqas, Engr. Dr. Syed Abbas Ali
|
Citation |
Vol. 21 No. 7 pp. 119-124
|
Abstract
|
Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company¡¯s information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.
|
Keywords
|
Cyber security, evolution, vision, SFA, 2FA, MFA, data breach, KBA.
|
URL
|
http://paper.ijcsns.org/07_book/202107/20210715.pdf
|

|
|