Attacks against Multi-factor Authentication
Journal: International Journal of Advances in Computer Science and Technology (IJACST) (Vol.13, No. 10)Publication Date: 2024-10-15
Authors : Anastasios Liveretos Milena Lazarova;
Page : 118-122
Keywords : Access management; identity management; multifactor authentication; multifactor authentication taxonomy;
Abstract
There is no such thing as bulletproof authentication, and multi-factor authentication (MFA) is not bulletproof either. There are attacks against MFA. In this paper, we not only present a historical outline of the most significant MFA attacks but also review the available taxonomy tools. Our aim is to equip enterprises with a clear understanding of how MFA attacks may occur and how these are classified. More importantly, we provide proactive considerations on how MFA attacks may be prevented, empowering enterprises to take action.
Other Latest Articles
- Optimizing TNA Method thru the Use of Cloud based App
- Talent Management with Blockchain Approach
- Relay Assisted Device-to-Device Communication for Future Generation Wireless Networks: A Review from Architectural and Challenges Perspective
- Synchronous and Asynchronous E-learning impact on Distance Education
- A Comparative Study of Transformer-based Models for Hate-Speech Detection in English-Kiswahili Code-Switched Social Media Text
Last modified: 2024-10-20 22:20:59