Authentication methodologies compared

This article is a continuation of the article ‘Securing information through identification, authentication and authorization’. The table below gives the pros and cons of the various authentication methodologies.

authentication methodologies

When only one authentication methodology is used it is called single factor authentication. When 2 or all authentication methodologies are used, they are called dual factor and multi-factor authentication respectively. It should be noted that having 2 authentication tools of the same methodology (eg. Using password as well as challenge question or PIN) does not constitute dual factor authentication. For an authentication to be a strong authentication there should be a minimum of two factor authentication.

Comments are closed.