Exploring Authentication Techniques: A Comprehensive Review

Authors

  • Dalal N. Hammod Dalal N. Hammod
  • Reem Hussain Ali Reem Hussain Ali

Keywords:

Authentication, single factor authentication, two-factor authentication, multi-factor authentication, One-time password

Abstract

E-commerce represented one of various new technologies that triggered with development of the internet. This causes the security aspect of e-commerce to be one of important factors, especially to prevent unwanted things such as data leaks and financial losses. Authentication is a critical aspect of securing digital systems and protecting user data. This paper reviews and compared three primary authentication methods: single factor authentication (SFA), two-factor authentication(2FA), and multi-factor authentication (MFA). SFA, the simplest method, relies on a single layer of security, such as passwords or PINs, but is highly vulnerable to modern cyber threats. 2FA enhanced security by combining two distinct factors, such as a password and One-time password (OTP), reducing the risks of credential theft. MFA further strengthens authentication by incorporating multiple layers, including biometric and contextual elements, making it the most secure approach but also the most complex and resource intensive. The discussion highlights the trade-offs between these methods in terms of security, usability, scalability, cost, and risk mitigation. While SFA may suffice for low-risk applications, MFA is essential for environments requiring robust security. The study conclude that the choice of authentication method should depend on a specific use case, balancing security needs with user convenience and organization resources.

Downloads

Published

08/25/2025

Issue

Section

Articles

How to Cite

Exploring Authentication Techniques: A Comprehensive Review. (2025). Al-Mansour Journal, 42(1), 1-14. https://journal.muc.edu.iq/journal/article/view/672