Q.14 Explain various methods for authentication.


There are various method of the authentication .
Password based authentication :
We all know that the password based authentication is the best type of authentication and is the most popular and widely used. Such type of authentication is mostly followed by the web applications, desktop applications .
In the password based authentication it consist of the usernames and the password combinations. The usernames can be email also . The password based authentication is strong but sometimes the human behaviour of maintaining the old and easy makes it very prone to attacks .
The bruteforce is a technique of assuming the password based on various combinations . hence all such mechanism had lead this authentication system to weaken against the attackers .
Multi factor authentication :
Such type of authentication adds the extra layer of security to the primary authentication mechanism . Such type of authentication is always used along with some primary authentication technique .
Now days almost all the web applications have the multi factor authentications. After logging in as the user the user have to complete some more steps to prove their authenticity .If we consider the password authentication as primary then we always have the One time password verification in conjunction with it . OTP is the one time code sent to the registered mobile number of the user to make sure the actual user is trying to login to the account .
There are also captcha and some other types of authentications are available that make sure that the humans are trying to login into the account and not any anonymous bot .
Step by step
Solved in 2 steps









