0

Risk-Based Authentication

KZero Staff
Oct 18, 2023

Risk-based authentication is a layer of security designed to assess the probability of account compromise with each login. If a system detects an unusual request or suspects malicious activity, it usually asks users to verify their identity through various methods. Examples of risk-based authentication include:

  • Being prompted by a system to authenticate yourself via biometric authentication.
  • A website asks users to enter a code sent to a mobile device.
  • An application requiring two-factor authentication when attempting to log in from an unknown location.
  • Answering security questions to access sensitive data.
KZero Staff

Explore more insightful content from the knowledgeable KZero staff on our blog and guides section.

Glossary Terms

Stay up to date with the most recent #infosec topics

Trending Topics

Share the page: