Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 451
Warning: Cannot modify header information - headers already sent by (output started at /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php:451) in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 654
Warning: Cannot modify header information - headers already sent by (output started at /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php:451) in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 655
TY - JOUR
TI - Exploring Authentication Techniques: A Comprehensive Review
PY - %2025/%08/%25
Y2 - %2025/%12/%22
JF - Al-Mansour Journal
JA - مجلة المنصور
VL - 42
IS - 1
LA - en
KW - Authentication
KW - single factor authentication
KW - two-factor authentication
KW - multi-factor authentication
KW - One-time password
UR - https://journal.muc.edu.iq/journal/article/view/672
SP - 51-64
AB - E-commerce represented one of various new technologies that triggered with development of the internet. This causes the security aspect of e-commerce to be one of important factors, especially to prevent unwanted things such as data leaks and financial losses. Authentication is a critical aspect of securing digital systems and protecting user data. This paper reviews and compared three primary authentication methods: single factor authentication (SFA), two-factor authentication(2FA), and multi-factor authentication (MFA). SFA, the simplest method, relies on a single layer of security, such as passwords or PINs, but is highly vulnerable to modern cyber threats. 2FA enhanced security by combining two distinct factors, such as a password and One-time password (OTP), reducing the risks of credential theft. MFA further strengthens authentication by incorporating multiple layers, including biometric and contextual elements, making it the most secure approach but also the most complex and resource intensive. The discussion highlights the trade-offs between these methods in terms of security, usability, scalability, cost, and risk mitigation. While SFA may suffice for low-risk applications, MFA is essential for environments requiring robust security. The study conclude that the choice of authentication method should depend on a specific use case, balancing security needs with user convenience and organization resources.
ER -