0
0
Cybersecurityknowledge~10 mins

Authentication factors (something you know, have, are) in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Authentication factors (something you know, have, are)
User tries to access system
System asks for authentication
User provides factor
System checks if factor is correct
Access granted or denied
The user tries to access a system, provides one or more authentication factors (knowledge, possession, or inherence), and the system verifies them to allow or deny access.
Execution Sample
Cybersecurity
User inputs password (something you know)
User inserts security token (something you have)
User scans fingerprint (something you are)
This shows the three types of authentication factors a user can provide to prove identity.
Analysis Table
StepAuthentication Factor TypeUser InputSystem CheckResult
1Something you knowPassword: 'mypassword123'Password matches stored passwordPass
2Something you haveSecurity token code: '456789'Code matches token generatorPass
3Something you areFingerprint scanFingerprint matches stored biometric dataPass
4Final decisionAll factors verifiedAll checks passedAccess granted
💡 All authentication factors verified successfully, so access is granted.
State Tracker
VariableStartAfter Step 1After Step 2After Step 3Final
Password checkNot checkedPassPassPassPass
Token checkNot checkedNot checkedPassPassPass
Biometric checkNot checkedNot checkedNot checkedPassPass
Access statusDeniedDeniedDeniedDeniedGranted
Key Insights - 2 Insights
Why does the system ask for different types of factors instead of just one?
Using multiple factors (knowledge, possession, inherence) increases security by making it harder for unauthorized users to gain access, as shown in the execution_table where all three checks must pass.
What happens if one factor fails the system check?
If any factor fails, the system denies access immediately. The execution_table shows all factors must pass for access to be granted.
Visual Quiz - 3 Questions
Test your understanding
Look at the execution_table at Step 2. What does the system check for?
AFingerprint match
BPassword correctness
CSecurity token code validity
DUser identity confirmation
💡 Hint
Refer to the 'System Check' column in Step 2 of the execution_table.
At which step does the system verify biometric data?
AStep 1
BStep 3
CStep 2
DFinal decision
💡 Hint
Check the 'Authentication Factor Type' column for 'Something you are' in the execution_table.
If the password was incorrect at Step 1, what would happen to the 'Access status' variable?
AIt would remain Denied
BIt would change to Granted
CIt would be Unknown
DIt would skip to Step 3
💡 Hint
Look at the 'Access status' row in variable_tracker and consider the effect of a failed check.
Concept Snapshot
Authentication factors verify identity using:
- Something you know (password, PIN)
- Something you have (security token, phone)
- Something you are (fingerprint, face)
Using multiple factors improves security by requiring more proof before access.
Full Transcript
Authentication factors are ways a system checks who you are. There are three main types: something you know, like a password; something you have, like a security token; and something you are, like your fingerprint. When you try to access a system, it asks for one or more of these. The system checks each factor. If all checks pass, you get access. If any check fails, access is denied. This method makes it harder for someone else to pretend to be you.