Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations

Mohammad Qbea'h, Jameela Alkaabi, Shamma Almansouri, Al Maha Alneyadi, Mouza Alderei

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

These days, the scope of a huge number of web, desktop, IoT, cloud and mobile applications being compromised is rapidly increasing. The attackers exploit weak authentication techniques to compromise government, educational, financial, and healthcare systems to access sensitive information. Authentication failure is very serious according to Open Web Application Security Project (OWASP) organization. This organization has ranked authentication failure among the top ten risks in the world in 2021 and 2023. In this study, we discuss the authentication technologies in terms of advantages, disadvantages, and drawbacks of some common authentication methods. We provide a comprehensive comparison table between several types of authentication techniques. Furthermore, we provide important recommendations for the future direction. Additionally, we provide a list of crucial factors for decision-makers to consider when selecting the appropriate authentication type. This research serves to raise awareness about the dangers of vulnerable authentication, benefiting users, companies, and researchers.

Original languageEnglish
Title of host publicationICCA 2023 - 2023 5th International Conference on Computer and Applications, Proceedings
EditorsJihad Mohamad Alja'Am, Jihad Mohamad Alja'Am, Samir Abou Elseoud, Omar Karam
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350303254
DOIs
Publication statusPublished - 2023
Event5th International Conference on Computer and Applications, ICCA 2023 - Cairo, Egypt
Duration: Nov 28 2023Nov 30 2023

Publication series

NameICCA 2023 - 2023 5th International Conference on Computer and Applications, Proceedings

Conference

Conference5th International Conference on Computer and Applications, ICCA 2023
Country/TerritoryEgypt
CityCairo
Period11/28/2311/30/23

Keywords

  • authentication
  • authentication failure
  • biometrics
  • password cracking
  • single sign on
  • survey
  • vulnerabilities

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Media Technology
  • Modelling and Simulation
  • Education

Fingerprint

Dive into the research topics of 'Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations'. Together they form a unique fingerprint.

Cite this