Показать сокращенную информацию

dc.contributor.authorSafin, R.R.
dc.contributor.authorAbdiraman, A.S.
dc.contributor.authorNurusheva, A.M.
dc.contributor.authorAldasheva, L.S.
dc.date.accessioned2023-06-02T11:39:37Z
dc.date.available2023-06-02T11:39:37Z
dc.date.issued2022
dc.identifier.issn2616-7263
dc.identifier.otherDOI: doi.org/10.32523/2616-7263-2022-140-3-114-124
dc.identifier.urihttp://rep.enu.kz/handle/enu/1464
dc.description.abstractSensitive information was always one of the big trade-offs we always exchange big secrets for small ones. On one hand, memorization of small secrets on the other hand tons of services requires a dedicated secret for each one. And when one of the services will be compromised it affects all services with the same password and credential. The main purpose of this article is to discuss multiple factors and increase security trade-offs differently. We will try to compare MFA (Multi-Factor Authentication), 2FA (Two Factor Authentication), 2SV (Two-Step Verification), and 1FA (One Factor Authentication) and investigate the password-free future.ru
dc.language.isoenru
dc.publisherL.N.Gumilyov Eurasian National Universityru
dc.subjectMFAru
dc.subjectpersonal dataru
dc.subjectcybercrimesru
dc.subjectdata leakageru
dc.subjectvulnerabilityru
dc.subjectverificationru
dc.subjectauthenticationru
dc.titleComparison of information security methods of information-communication infrastructure: Multi-Factor Authenticationru
dc.typeArticleru


Файлы в этом документе

Thumbnail

Данный элемент включен в следующие коллекции

Показать сокращенную информацию