Authentication is the process of proving that something is genuine. While the term can apply to establishing the authenticity of a fact, document, device, or other point of trust, we use it here to describe the process of using knowledge based authentication in establishing the identity of a person.
Knowledge based authentication, or KBA, uses “what you know” to verify your identity. KBA conceptually requires an individual to possess and share information that is only known by that individual in order to prove that they are who they say they are.
It is a security measure that enables users to prove their identity when challenged. How many times have you logged into an account with a username and password today? Have you ever entered your mother’s maiden name to be able to reset a forgotten password? These are all examples of knowledge based authentication.
There are two types of KBA, static and dynamic.
Static KBA is the most common type of authentication used today. On initial enrollment or account registration, an individual provides information that will then be used to grant access or reset credentials in the future. This information is shared between the organization providing the service and the end user. The user provides this information each time they authenticate, and the organization concurrently retrieves it to verify the user’s provided credentials.
Dynamic KBA methods are often referred to as out-of-wallet questions because the answers are not generally found in a person’s wallet. Dynamic KBA differs from static KBA in that it does not require the user to provide pre-determined information on enrollment into a system, but instead generates questions and answers pertaining to the user from public and private data including marketing data and credit reports. After the user provides general identity information like name and date of birth, the organization retrieves records and generates questions and answers to authenticate the identity of the user.
With the sheer amount of information on any given person available online through social, public records, and past exposures, a bad actor may be able to provide the answer to “What is the name of your first pet?” just as easily as you can. A quick search on https://haveibeenpwned.com/ can show some of the data breaches associated with your email address where some underlying KBA information may have been leaked.
Many organizations store all user credentials on one centralized database, leading to devastating data breaches that expose vast amounts of personal data, such as the 2013 Adobe breach which impacted around 38 million users.
There have been so many data breaches which means that knowing your mother’s maiden name or which street you lived on is no longer a reliable way to prove that you are who you say you are.
Although password use is ubiquitous and works on any device, it poses a number of security challenges.
One study shows that the average person has 90 online accounts, nearly all of which rely on KBA! If one of your passwords is exposed in an account takeover attack, how many other accounts can be compromised along with it?
Personal credentials are exposed every day by unknowing victims of phishing and other social engineering schemes
While weak passwords are easily guessed, strong passwords can be easily forgotten. U.S. Gartner reported an average of 10% to 15% failure rate on KBA. Research from Keeper Security revealed that up to 17% of people use the password "123456" to 'secure' their accounts, while 50% use one of the top 25 most common passwords.
When cybercriminals can easily compromise or guess credentials and genuine users are not able to remember them, KBA fails to serve the primary function – authentication! In fact, in last year’s NIST Special Publication on Digital Identity Guidelines, KBA was no longer considered an acceptable authenticator because of its unacceptably high risk of successful use by an attacker.
In the case of passwords, it is difficult to balance security and convenience. Instead of protecting user accounts, authentication requirements can become a barrier to accessing services. Companies are increasingly implementing multi-factor authentication processes as the norm to add another layer of security and assurance to identity authentication. We see this happening with widespread adoption of biometric identity verification solutions in the financial services and healthcare industries for example, where privacy, security, and data protection are critical for regulatory compliance and user satisfaction.
We use necessary cookies to make our site work. We'd also like to set optional analytics cookies to help us improve it. We won't set optional cookies unless you enable them. Using this tool will set a cookie on your device to remember your preferences.
For more detailed information about the cookies we use, see our Cookies page
Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by changing your browser settings, but this may affect how the website functions.
We'd like to set Google Analytics cookies to help us to improve our website by collecting and reporting information on how you use it. The cookies collect information in a way that does not directly identify anyone. For more information on how these cookies work, please see our Cookies page.Save and close