What purposes does the authentication process serve? contrasting and comparing the benefits and drawbacks of different authentication methods
What purposes does the authentication process serve? contrasting and comparing the benefits and drawbacks of different authentication methods
For example, user A can only access relevant data and cannot see sensitive data from user B.
Cybercriminals can gain access to the system and steal information if user authentication is not secure.
There are many ways to go about the verification process:
Security Concerns:
Setting up security questions is easy.
The service will usually offer you a selection of questions from which you can choose several and answer them.
Many answers to security questions are straightforward.
Public records or social media may provide details such as your father's middle name or the street where you grew up.
Messages sent by SMS or email:
Text (and email) conversations are convenient because practically everyone has them.
Messages are often sent instantly or within a few minutes at most.
Step by step
Solved in 2 steps