The second diagram is dedicated to my research essay where I researched different ways of authentication in order to offer the alternative to text password authentication:
It represents the most important aspects of authentication technique such as memorizing effort, deployability and costs. It shows that although there are enough techniques that cover two of the aspects, there is no technique that includes all of the aspects yet.
The diagram may be used to emphasize the importance of two/three step authentication since it lets user use the benefits of different authentication techniques and makes user not to rely on one particular authentication technique. For further research it would be necessary to create another diagram which would represent security level of different authentication techniques in order to demonstrate that text passwords are still considered to be one of the most secure and efficient.
Comments
Post a Comment