dc.contributor.advisor | Delgado Cuadro, Enrique | |
dc.contributor.author | Valverde Castro, Jonathan David | |
dc.date.accessioned | 2023-11-07T21:24:51Z | |
dc.date.available | 2023-11-07T21:24:51Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/15075 | |
dc.description | In today's digital age, information security is of paramount importance. Authentication plays a vital role in ensuring exclusive access to sensitive systems, applications and data. This study focuses on comparing two authentication methods: single-factor and multi-factor.
Single-factor authentication relies on verifying a single element, such as a password or fingerprint. In contrast, multifactor authentication involves evidence such as what the user knows (password), what the user has (security token) and who This study adopted a deductive approach and employed user surveys as part of the research process. The main objective is to perform a detailed comparative analysis of single-factor and multifactor authentication methods, evaluating their security and usability. It aims to identify the strengths and weaknesses of each approach, providing a clearer picture of when and how each approach can be effectively implemented. Given the increase in cyberattacks and security breaches, multifactor authentication is becoming a more robust option for protecting user identities. This comparative analysis helps to better understand which approach is best suited to specific needs and how to leverage its benefits in today's digital environment. is the user (fingerprint or facial recognition). | es_ES |
dc.description | In today's digital age, information security is of paramount importance. Authentication plays a vital role in ensuring exclusive access to sensitive systems, applications and data. This study focuses on comparing two authentication methods: single-factor and multi-factor.
Single-factor authentication relies on verifying a single element, such as a password or fingerprint. In contrast, multifactor authentication involves evidence such as what the user knows (password), what the user has (security token) and who This study adopted a deductive approach and employed user surveys as part of the research process. The main objective is to perform a detailed comparative analysis of single-factor and multifactor authentication methods, evaluating their security and usability. It aims to identify the strengths and weaknesses of each approach, providing a clearer picture of when and how each approach can be effectively implemented. Given the increase in cyberattacks and security breaches, multifactor authentication is becoming a more robust option for protecting user identities. This comparative analysis helps to better understand which approach is best suited to specific needs and how to leverage its benefits in today's digital environment. is the user (fingerprint or facial recognition). | es_ES |
dc.description.abstract | En la era digital actual, la seguridad de la información es de suma importancia. La autenticación juega un papel vital para garantizar el acceso exclusivo a sistemas, aplicaciones y datos confidenciales. Este estudio se centra en comparar dos métodos de autenticación: de factor único y multifactor. La autenticación de factor único se basa en verificar un solo elemento, como una contraseña o una huella digital. Por el contrario, la autenticación multifactor implica evidencia como lo que el usuario sabe (contraseña), lo que tiene (token de seguridad) y quién este estudio adoptó un enfoque deductivo y empleó encuestas a usuarios como parte del proceso de investigación. El objetivo principal es realizar un análisis comparativo detallado de los métodos de autenticación unifactorial y multifactor, evaluando su seguridad y usabilidad. Su objetivo es identificar las fortalezas y debilidades de cada enfoque, proporcionando una visión más clara de cuándo y cómo cada enfoque puede implementarse de manera efectiva. Dado el aumento de los ciberataques y las violaciones de seguridad, la autenticación multifactor se convierte en una opción más sólida para proteger las identidades de los usuarios. Este análisis comparativo ayuda a comprender mejor qué enfoque se adapta mejor a necesidades específicas y cómo aprovechar sus beneficios en el entorno digital actual. es el usuario (huella digital o reconocimiento facial). | es_ES |
dc.format.extent | 29 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo: UTB-FAFI. 2023 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Seguridad | es_ES |
dc.subject | Información | es_ES |
dc.subject | Datos | es_ES |
dc.subject | Ciberataques Y Huella Digital | es_ES |
dc.title | Análisis comparativo entre los métodos de autenticación unifactorial y multifactorial | es_ES |
dc.type | bachelorThesis | es_ES |