DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Document

Implementing Strong Authentication

Reading Time: 2 mins read
in Document, Report

AUDIENCE

Weak authentication is a common vulnerability for information systems—it is consistently one of CISA’s top five, most frequent findings for Federal High Value Asset systems. Furthermore the 2019 Verizon Data Breach Investigations Report states that compromised passwords remain “prominent fixtures” of breaches.1 Implementing strong authentication methods across an organization can dramatically improve resilience against common cybersecurity threats such as phishing attacks and compromised credentials. Although this guide references federal standards and publications, it is not mapped to nor directly associated with any agency. These recommendations are applicable to any organization seeking to better their authentication process.

PURPOSE

The purpose of this guide is to lay out the concept of authentication, recommend related security enhancements, and provide guidance to help plan and implement a strong authentication solution. Strong authentication is one of many pillars of a defense-in-depth cybersecurity strategy, but it is not the only solution to cybersecurity issues.

THE CONCEPT

Authentication is the process of verifying that a user’s identity is genuine. Most systems require a user to be authenticated prior to granting access to the system. The user does this by entering a password, inserting a smart card and entering the associated personal identification number (PIN), providing a biometric (e.g., fingerprint, voice pattern sample, retinal scan)—or a combination of these things—to prove they are who they claim to be. The credentials provided are compared to those that have previously been associated with the user. The credential match may be performed within the system being accessed or via a trusted external source. If the credentials match, the system authenticates the identity and grants access.

GET REPORT

Tags: MFAMFA DocumentReport
ADVERTISEMENT

Related Posts

National cyber threat assessment 2023–2024

National cyber threat assessment 2023–2024

March 21, 2023
2023 SonicWall Cyber Threat Report

2023 SonicWall Cyber Threat Report

March 21, 2023
Sophos 2023 Threat Report

Sophos 2023 Threat Report

March 21, 2023
CrowdStrike 2023 Global Threat Report

CrowdStrike 2023 Global Threat Report

March 21, 2023

More Articles

“This is an incredible show to watch. But it’s definitely not an investment…”

March 5, 2021
Book

Damage Control: Cyber Insurance and Compliance

June 6, 2022
Incidents

NYC school platform outage complicating COVID-19 tracing efforts

January 18, 2022

Pentoo

October 18, 2020
Alerts

Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware

December 6, 2022
Alerts

New Android malware ‘RatMilad’ can steal your data

October 5, 2022
Incidents

Data breach at New Mexico healthcare business impacts 62,000 state residents

November 25, 2021

Hack at all cost: putting a price on APT attacks

April 13, 2021
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.