0
0
Cybersecurityknowledge~3 mins

Why Authentication factors (something you know, have, are) in Cybersecurity? - Purpose & Use Cases

Choose your learning style9 modes available
The Big Idea

What if a simple password isn't enough to keep your secrets safe?

The Scenario

Imagine trying to protect your house by only locking the front door with a simple key that anyone could copy or guess. You worry someone might sneak in because the lock is easy to pick or the key could be lost or stolen.

The Problem

Relying on just one way to prove who you are, like a password, is risky. Passwords can be forgotten, guessed, or stolen. This makes your accounts and personal information vulnerable to hackers and identity thieves.

The Solution

Using multiple ways to prove your identity--like something you know (a password), something you have (a phone or security token), and something you are (your fingerprint)--makes it much harder for someone else to pretend to be you. This layered approach strengthens security and keeps your information safer.

Before vs After
Before
if password == stored_password:
    allow_access()
After
if password == stored_password and token == user_token and fingerprint == stored_fingerprint:
    allow_access()
What It Enables

This approach enables strong protection of your digital life by making unauthorized access extremely difficult.

Real Life Example

When you log into your bank app, you enter your password (something you know), then receive a code on your phone (something you have), and sometimes use your fingerprint (something you are) to confirm it's really you.

Key Takeaways

Single methods like passwords can be weak and risky.

Combining multiple authentication factors greatly improves security.

Authentication factors include knowledge, possession, and biometrics.