DSpace Repository

Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication

Show simple item record

dc.contributor.author Safin, R.R.
dc.contributor.author Abdiraman, A.S.
dc.contributor.author Nurusheva, A.M.
dc.contributor.author Aldasheva, L.S.
dc.date.accessioned 2023-06-02T11:39:37Z
dc.date.available 2023-06-02T11:39:37Z
dc.date.issued 2022
dc.identifier.issn 2616-7263
dc.identifier.other DOI: doi.org/10.32523/2616-7263-2022-140-3-114-124
dc.identifier.uri http://rep.enu.kz/handle/enu/1464
dc.description.abstract Sensitive information was always one of the big trade-offs we always exchange big secrets for small ones. On one hand, memorization of small secrets on the other hand tons of services requires a dedicated secret for each one. And when one of the services will be compromised it affects all services with the same password and credential. The main purpose of this article is to discuss multiple factors and increase security trade-offs differently. We will try to compare MFA (Multi-Factor Authentication), 2FA (Two Factor Authentication), 2SV (Two-Step Verification), and 1FA (One Factor Authentication) and investigate the password-free future. ru
dc.language.iso en ru
dc.publisher L.N.Gumilyov Eurasian National University ru
dc.subject MFA ru
dc.subject personal data ru
dc.subject cybercrimes ru
dc.subject data leakage ru
dc.subject vulnerability ru
dc.subject verification ru
dc.subject authentication ru
dc.title Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication ru
dc.type Article ru


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account