ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Attacks against Multi-factor Authentication

Journal: International Journal of Advances in Computer Science and Technology (IJACST) (Vol.13, No. 10)

Publication Date:

Authors : ;

Page : 118-122

Keywords : Access management; identity management; multifactor authentication; multifactor authentication taxonomy;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

There is no such thing as bulletproof authentication, and multi-factor authentication (MFA) is not bulletproof either. There are attacks against MFA. In this paper, we not only present a historical outline of the most significant MFA attacks but also review the available taxonomy tools. Our aim is to equip enterprises with a clear understanding of how MFA attacks may occur and how these are classified. More importantly, we provide proactive considerations on how MFA attacks may be prevented, empowering enterprises to take action.

Last modified: 2024-10-20 22:20:59