Methods for User Authentication in Cybersecurity

Thumbnail Image

Date

2024-05-22

Journal Title

Journal ISSN

Volume Title

Publisher

University of Portsmouth

Abstract

Cybersecurity challenges keep changing all the time particularly in countries such as Saudi Arabia which are making quick progressions in digital infrastructure development alongside technology innovations. This study focuses on examining the various user authentication methods employed by Saudi users so that the major cyber risks they face in this locality can be tackled. With regards to vulnerabilities that traditional user authentication methods display, there is a need for examining ways of making them more secure especially with respect to the applicable loop holes in password-based and knowledge-based authentication methods. In addition, the study delves into recent advances in user validation apparatuses concentrating on biometric and multi-factor validation (MFA) pointing out the efficiency with which they enhance data security. Furthermore, the research is going to assess the extent to which the passwordless authentication approaches affect user safety and ease. Incorporating an online questionnaire survey, a study which uses a quantitative research method in order to capture the desires, perceptions and past experiences that the users have had in regard to certain means of identity confirmation. The study also seeks to establish whether advanced authentication methods can be integrated or not into existing cybersecurity frameworks based on the findings obtained through this research. This research is considered important as it could make it possible for cyber security measures to be increased, the number of data breaches can minimize, and provide initiative to Saudi Arabian organizations to enhance their user authentication processes. Fundamentally, this paper seeks making user authentication landscape safer and credible hence strengthening response against threats.

Description

Keywords

Cybersecurity, knowledge-based, password-based, Passwordless, Multi-factor authentication MFA, Biometric, Authentication Framework.

Citation

Endorsement

Review

Supplemented By

Referenced By

Copyright owned by the Saudi Digital Library (SDL) © 2025