Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication


Views: 182 / PDF downloads: 199

Authors

  • R. Safin Linnovate Ltd
  • A. Abdiraman L.N. Gumilev Eurasian National University, Astana IT University
  • A. Nurusheva Astana IT University
  • L. Aldasheva Astana IT University

DOI:

https://doi.org/10.32523/2616-7263-2022-140-3-114-124

Keywords:

MFA, personal data, cybercrimes, data leakage, vulnerability, verification, authentication

Abstract

Sensitive information was always one of the big trade-offs we always exchange big secrets for small ones. On one hand, memorization of small secrets on the other hand tons of services requires a dedicated secret for each one. And when one of the services will be compromised it affects all services with the same password and credential. The main purpose of this article is to discuss multiple factors and increase security trade-offs differently. We will try to compare MFA (Multi-Factor Authentication), 2FA (Two Factor Authentication), 2SV (Two-Step Verification), and 1FA (One Factor Authentication) and investigate the password-free future.

Downloads

Published

2022-09-30

How to Cite

Safin, R., Abdiraman, A., Nurusheva, A., & Aldasheva, L. (2022). Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication. Bulletin of L.N. Gumilyov Eurasian National University Technical Science and Technology Series, 140(3), 114–124. https://doi.org/10.32523/2616-7263-2022-140-3-114-124

Issue

Section

Article