Saturday, July 13, 2024

How Selfie Authentication Process Improve the Security Along With Other Authentication Methods

Digital identity has two different domains – one is identity proofing and the other is authentication, where both have been unique to each other for many years.

Businesses have now utilized several identity proofing methods to distinguish users’ identities by having them visit their local branch office or provide proof of their identity and address.

However, as more people are now using the Internet and apps on their PC or mobile gadget for the modern enterprise, financial institution and banking service, they are progressively researching for online ways to identity proof new customers without seeing them in person. 

Using Identity Proofing Techniques

At times, businesses resort to online financial databases and credit bureaus to match identities using their customer’s name, address and social security number. In some cases, they utilize knowledge-based verification where users are asked multiple proofing questions, such as asking them their Zip codes on places they have lived for the past five years. Their response is then confirmed in public record databases.

However, modern technology has made this identity proofing technique futile as cybercriminals can purchase information easily on the Net or through social media.

More recently, these businesses have requested their online customers to capture a picture of their government-issued ID and a selfie using a PC webcam or smartphone. If they’re using a legitimate ID, the picture on the identification is compared to the selfie to ensure they’re dealing with the same individual.

Using Authentication Methods

The same business then uses a disparate set of authentication method to verify the person doing the transaction if he is the same one who created the online account. Aside from providing the username and password, they need online assurance to ensure the user is who they claim to be.

The authentication technique is focused on the following risk factors – logging in from a foreign IP address; resetting passwords; huge money or wire transfers; having several unsuccessful logins; requesting a change on authorized permissions; and, continuous security for ridesharing and delivery services, online test taking and car rentals. Businesses use different technologies to ensure authentication.

Overlapping Between These Two Technologies

Conventional online authentication is sacrificed due to a number of reasons:

  • Password logging in: Almost any account found on the Internet requires a username and password. However, passwords are easily forgotten, insecure and shared with other websites. Cybercriminals can easily hack them if they take information illegally.
  • Knowledge-based authentication: Customers are asked specific security questions to ensure accurate authorization for online and digital activities. However, large-scale data breaches are now offered for sale crooks can easily access.
  • Out-of-band authentication: The authentication process done here requires two variable signals from a different network or channel, like the SMS-based authentication. However, this method is vulnerable to phishing, keylogging and SMS-spoofing attacks.
  • Token-based authentication: This type of authentication uses software tokens kept in electronic devices such as PCs, laptops, tablets or smartphones. However, they entail more costs and the need for users to carry them wherever they go. One-time passwords are non-transferrable, so it should create problems when the device is lost, stolen or replaced.
  • Biometric Authentication: Here, the biological features of a certain individual is used to authenticate the account. However, crooks can do spoofing attacks to access privileges and rights.


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles