Multi-Factor Authentication (MFA) is to use two or more factors to authenticate

Multi-Factor Authentication and Biometric Authentication

Importance of Multi-Factor Authentication

Multi-Factor Authentication (MFA) is to use two or more factors to authenticate one’s identity in order to enhance the security.  MFA has long been adopted in our daily life. For example, we have to use a physical ATM card and a 6-digit PIN code to withdraw cash at ATM.  Another example is that when we shop online, we have to input card details (such as card number, expiry date and CVV code) and an SMS one-time password to complete the payment.

The adoption of MFA prevents hackers from logging into your account directly even if they have got the password, which has greatly enhanced the information security.

MFA is generally divided into 3 aspects:

Is MFA bulletproof?

Certainly not.  Hackers can still steal one-time passwords or bypass authentication through social engineering or intruding into system loopholes.  Therefore, you should stay alert at all times on the Internet.

Biometric Authentication

Biometric authentication technology refers to the use of physiological and behavioural characteristics to verify or authenticate the identity.

Physiological characteristics: fingerprints

Physiological characteristics: face

Physiological characteristics: iris, retina, DNA

Behavioural characteristics: voice

Behavioural characteristics: stroke

Behavioural characteristics: gait

Biometric authentication technology has long been adopted by law enforcement agencies around the world for investigation and immigration control.  As biometric authentication technology has become more sophisticated, it has been widely applied to our daily lives, as in smart phones, monitoring and alerting systems, attendance record, computer products, banking services, etc.

Is biometric authentication bulletproof?

It was reported that the biometric authentication in some smart phones might be cracked.  Hackers or criminals can even steal your personal information through social engineering or intruding into system loopholes.  Therefore, it is advised not to rely on one single security technology.

You may be interested in

Cyber Security and Technology Crime Bureau, initiated a new wave of cyber hygiene operation to improve online security, maintain system…

Free Wi-Fi is provided in public places such as government public facilities, shopping malls Free Public Wi-Fi Free Wi-Fi is…

Social media and instant messaging software have become essential tools for our daily social interaction Security of Social Media Account…

Together with the following software companies, we offer free scanning and cleaning tools. Tools for Digital Devices Scanning and Cleaning…

In late 2020, a virtual private network service provider published a list of passwords which took the shortest time Is…

Welcome to subscribe

Please read our “Privacy Policy” carefully before filling out the form. For enquiries, please email to [email protected]

Declaration
We, Cyber Defender, collect your personal information including name, gender, and contact information (e.g. telephone number(s) and email address) only for the latest information-sharing proposal

* Must declare

Sign up for web hosting today!

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Subscribe successfully.
Please check your email.