Abstract

In this paper, we present a comprehensive taxonomy of the most popular authentication mechanisms, the main threats, vulnerabilities, the possible types of attacks and the security issues that are associated with computer systems. Our main contribution is to analyze the architecture of the current security environment from all aspects and to make a comparative assessment of different authentication methods in order to identify and develop a scalable and reliable mechanism that must deal with multi-level security and strong authentication requirements. We propose hybrid methods of authentication, which combine and integrate biometric technologies with cryptographic asymmetric algorithms, elements that play a vital role in the field of information security and aim to resolve the shortcomings of traditional methods of authentication and enhance the level of security.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call