Cisco CloudCenter: Get the Hybrid IT Advantage

Knowledge-Based Authentication (KBA)

Definition - What does Knowledge-Based Authentication (KBA) mean?

Knowledge-based authentication (KBA) is a security measure that identifies end users by asking them to answer specific security questions in order to provide accurate authorization for online or digital activities. Knowledge-based authentication has become prevalent in many different types of network setups and across the Internet, where companies often ask users to answer these questions in order to gain access to personal, password-protected areas of a site.

Techopedia explains Knowledge-Based Authentication (KBA)

Two common kinds of knowledge-based authentication are static KBA and dynamic KBA. In static knowledge-based authentication, the users themselves input answers to security questions when they set up a password-protected profile or system. Later, if they need to renew their password or prove their identity, they may be asked to provide the answers that they provided earlier. By contrast, dynamic KBA uses data mining systems to present users with questions that IT systems know the answer to, having previously gathered this data about a user. The challenges involved in accurate dynamic KBA have led many companies to use static KBA instead. In many cases, knowledge-based authentication is used as part of multi-factor authentication, where other types of security processes like IP checking may also be used.

The idea behind KBA is that by selecting questions that only the target individual would know the answers to, systems can verify whether a user is the legitimate owner of a password-protected area or not. Although KBA can be an effective way to manage authorization for individual users, there are also critical concerns about privacy that have been raised around the idea of using this kind of personal information for online or network security.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.