Group Members Hammad Iftikhar Ul Haq F2018266219 Muhammad Ahmad F2019266242 Syed Ammar Bukhari F2019266243 Resource Person Ammar Yasir Sajjad Top Best Authentication Systems What is Authentication • • Authentication is the process of verifying the identity of a user or information. User authentication is the process of verifying the identity of a user when that user logs in to a computer system. Example Code Generate From Smartphones Captcha Test Fingerprints Voice Biometrics Face Recognition Types of Authentications Single Factor Authentication Two Factor Authentication Multi Factor Authentication Single Factor Authentication This was the first method of security that was developed. On this authentication system, the user has to enter the username and the password to confirm whether that user is logging in or not. Advantages • It is a very simple to use and straightforward system. • It is not at all costly. • The user does not need any huge technical skills. Disadvantages • It is not at all password secure. It will depend on the strength of the password entered by the user. • The protection level in Single-Factor Authentication is much low. Two Factor Authentication In this authentication system, the user has to give a username, password, and other information. There are various types of authentication systems that are used by the user for securing the system. Advantages • Provides better security than the Single-factor Authentication system. • The productivity and flexibility increase in the two-factor authentication system. • Two-Factor Authentication prevents the loss of trust. Disadvantages • It is time-consuming. Multi Factor Authentication In this type of authentication, more than one factor of authentication is needed. This gives better security to the user. Any type of keylogger or phishing attack will not be possible in a Multi-Factor Authentication system. This assures the user, that the information will not get stolen from them. Advantages • • • • No risk of security. No information could get stolen. No risk of any key-logger activity. No risk of any data getting captured. Disadvantages • • It is time-consuming. It can rely on third parties. Top Best Authentication Systems There are plenty of options out there, but here's our shortlist of the best Authentication Systems. These products won a Top Rated award for having excellent customer satisfaction ratings. WatchGuard AuthPoint Cisco Secure Access by Duo Google Authenticator The Okta Identity Cloud Azure Active Directory LastPass for Business Firebase WatchGuard AuthPoint • • • WatchGuard AuthPoint is a multi-factor authentication (MFA) service Helps companies keep their assets, information, and user identities secure. AuthPoint’s mobile app makes it easy for users to approve or deny login attempts. Cisco Secure Access by Duo • • Cisco Secure Access, by Duo, now part of Cisco It is presented as a solution to protect applications by using a second source of validation, like a phone or token, to verify user identity before granting access. Google Authenticator • It is a mobile authentication app Okta Identity Cloud • • • Okta is an independent identity provider. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. More than 7,000 pre-built integrations to applications and infrastructure providers Azure Active Directory • • • Microsoft Azure Active Directory (Azure AD) is a cloud-based identity. Supports restricted access to applications with Azure Multi-Factor Authentication (MFA). Built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration with Microsoft productivity and cloud storage (Office 365, OneDrive, etc) as well as 3rd party services. LastPass for Business • • • Identity management software Covers password management, single sign-on, and multifactor authentication. LastPass business solutions aim to help teams & businesses take control of their identity management by providing unified visibility across every entry point to the user’s business. Firebase • • Google offers the Firebase suite of application development tools, Available free or at cost for higher degree of usages, priced flexibly accorded to features needed. Courses in Pakistan CISSP - Certified Information Systems Security Professional CISMP - Certificate in Information Security Management Principles CISA - Certified Information Systems Auditor CISSP - Certified Information Systems Security Professional Held by over 30,000 qualified professionals worldwide, the Certified Information Systems Security Professional qualification shows proven knowledge and is the key to a higher earning potential in role. Location: OMNI Academy Karachi BBR Towers. 35 hours course duration. Fee : 393000 Pay : 25k to 10 lac LEARNING Use the knowledge gained in a practical manner beneficial to your organization Protect your organizational assets using access control techniques and strengthen confidentiality and integrity controls from the world of cryptography Secure your network architecture and design (implement Cyber security) Achieve your organizational objectives such as legal & compliance, Information assurance, security and data governance Visit Website Omny Academy and apply online. Where you can apply: Thank You