dc.contributor.author |
Safin, R.R. |
|
dc.contributor.author |
Abdiraman, A.S. |
|
dc.contributor.author |
Nurusheva, A.M. |
|
dc.contributor.author |
Aldasheva, L.S. |
|
dc.date.accessioned |
2023-06-02T11:39:37Z |
|
dc.date.available |
2023-06-02T11:39:37Z |
|
dc.date.issued |
2022 |
|
dc.identifier.issn |
2616-7263 |
|
dc.identifier.other |
DOI: doi.org/10.32523/2616-7263-2022-140-3-114-124 |
|
dc.identifier.uri |
http://rep.enu.kz/handle/enu/1464 |
|
dc.description.abstract |
Sensitive information was always one of the big trade-offs we always exchange
big secrets for small ones. On one hand, memorization of small secrets on the other hand
tons of services requires a dedicated secret for each one. And when one of the services will
be compromised it affects all services with the same password and credential. The main
purpose of this article is to discuss multiple factors and increase security trade-offs
differently. We will try to compare MFA (Multi-Factor Authentication), 2FA (Two Factor
Authentication), 2SV (Two-Step Verification), and 1FA (One Factor Authentication) and
investigate the password-free future. |
ru |
dc.language.iso |
en |
ru |
dc.publisher |
L.N.Gumilyov Eurasian National University |
ru |
dc.subject |
MFA |
ru |
dc.subject |
personal data |
ru |
dc.subject |
cybercrimes |
ru |
dc.subject |
data leakage |
ru |
dc.subject |
vulnerability |
ru |
dc.subject |
verification |
ru |
dc.subject |
authentication |
ru |
dc.title |
Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication |
ru |
dc.type |
Article |
ru |