<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2022-7-4-0-7</article-id><article-id pub-id-type="publisher-id">2966</article-id><article-categories><subj-group subj-group-type="heading"><subject>ARTIFICIAL INTELLIGENCE AND DECISION MAKING</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;ANALYSIS OF WAYS TO IMPLEMENT A MULTI-FACTOR AUTHENTICATION SYSTEM&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;ANALYSIS OF WAYS TO IMPLEMENT A MULTI-FACTOR AUTHENTICATION SYSTEM&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Nadeikina</surname><given-names>Victoria Sergeevna</given-names></name><name xml:lang="en"><surname>Nadeikina</surname><given-names>Victoria Sergeevna</given-names></name></name-alternatives><email>nice.nadeykina@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Lagutkina</surname><given-names>Tatyana Vladimirovna</given-names></name><name xml:lang="en"><surname>Lagutkina</surname><given-names>Tatyana Vladimirovna</given-names></name></name-alternatives><email>lagutkina.tatiana@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2022</year></pub-date><volume>7</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2022/4/7_ИТ_НР_pCAluX4.pdf" /><abstract xml:lang="ru"><p>The role of vulnerabilities in information security occupies a large niche, for traditional one-factor authentication is a serious problem for both security specialists and researchers of this problem. Security solutions must be timely and productive. In this direction, new technologically advanced multi-factor authentication tools have been developed. Multi-factor Authentication (MFA). This technology combines two or more types of authentication to provide and enhance additional security methods for user authentication. Consider and analyze some ways to implement multi-factor authentication.</p></abstract><trans-abstract xml:lang="en"><p>The role of vulnerabilities in information security occupies a large niche, for traditional one-factor authentication is a serious problem for both security specialists and researchers of this problem. Security solutions must be timely and productive. In this direction, new technologically advanced multi-factor authentication tools have been developed. Multi-factor Authentication (MFA). This technology combines two or more types of authentication to provide and enhance additional security methods for user authentication. Consider and analyze some ways to implement multi-factor authentication.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>authentication</kwd><kwd>multi-factor authentication</kwd><kwd>authentication principles</kwd><kwd>ways to implement multi-factor authentication</kwd><kwd>MFA</kwd></kwd-group><kwd-group xml:lang="en"><kwd>authentication</kwd><kwd>multi-factor authentication</kwd><kwd>authentication principles</kwd><kwd>ways to implement multi-factor authentication</kwd><kwd>MFA</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Kaspersky Lab has calculated how many times hackers have tried to steal passwords from Russians. URL: https://clck.ru/32kJ6s.</mixed-citation></ref><ref id="B2"><mixed-citation>What is Multi-factor Authentication (MFA)? URL: https://clck.ru/32kJ8w.</mixed-citation></ref><ref id="B3"><mixed-citation>Kuzminykh E.S., Maslova M.A. Analysis and comparison of biometric methods for identifying a person&amp;nbsp;// Research result. Information technology. &amp;ndash; 2021. &amp;ndash; T. 6. &amp;ndash; № 4. &amp;ndash; P. 13-19.</mixed-citation></ref><ref id="B4"><mixed-citation>Devitsyna S.N., Eletskaya T.А., Balabanova T.N., Gakhova N.N The development of intelligent biometric identification system user // Belgorod State University Scientific Bulletin. Economics. Information technologies. 2019. T. 46. № 1. P. 148-160.</mixed-citation></ref><ref id="B5"><mixed-citation>Fedotov A.S. Basic principles of implementing multi-factor authentication // 67th Scientific and Technical Conference of students, undergraduates and undergraduates, April 18-23, Minsk: collection of scientific papers: at 4 h. h. 4.</mixed-citation></ref><ref id="B6"><mixed-citation>Maslova M.A. Analysis and determination of information security risks // Research result. Information technology. &amp;ndash; 2019. &amp;ndash; T. 4. &amp;ndash; № 1. &amp;ndash; P. 31-37.</mixed-citation></ref><ref id="B7"><mixed-citation>Troshkov A.M., Kondrashov A.V., Kondrashov Yu.V., Khlobystin N.S., Krylova L.A. Biometric characteristics of identity authentication and their protection system // Questions of defense technology. Series 16: Technical means of countering terrorism. Founders: Scientific and Production Association of Special Materials, FSUE &amp;quot;Scientific and Technical Center &amp;quot;Informtechnika&amp;quot; ISSN: 2306-1456.</mixed-citation></ref><ref id="B8"><mixed-citation>Gerasimov V.M., Maslova M.A. Possible threats and attacks on the user voice identification system // Research result. Information technology. &amp;ndash; 2022. &amp;ndash; T. 7. &amp;ndash; № 1. &amp;ndash; P. 32-37.</mixed-citation></ref><ref id="B9"><mixed-citation>Bardaev S.E. Multifactorial biometric threshold cryptosystem // Izvestiya SFU. Technical sciences. Founders: Southern Federal University ISSN: 1999-9429eISSN: 2311-3103.</mixed-citation></ref><ref id="B10"><mixed-citation>Devitsyna S., Eletskaya T., Meshkov A.V. Developing facial recognition software to control access to campus facilities sbornike: CEUR Workshop Proceedings. 2. Ser. &amp;quot;InnoCSE 2019 &amp;ndash; Proceedings of the 2nd Workshop on Innovative Approaches in Computer Science within Higher Education&amp;quot; 2019. P. 68-76.</mixed-citation></ref><ref id="B11"><mixed-citation>Krotov A.V., Kutuzov A.V. Application of multi-factor authentication in order to protect EUT funds from unauthorized access // Modern scientific research and innovation. 2021. № 3.</mixed-citation></ref><ref id="B12"><mixed-citation>Bogdanov D.S., Klyuev S.G. Classification and comparative analysis of multifactor authentication technologies in web applications // Modeling, optimization and information technology. Founders: Voronezh Institute of High Technologies eISSN: 2310-6018</mixed-citation></ref><ref id="B13"><mixed-citation>Types Of Biometrics: A Complete Guide. URL: https://clck.ru/32knZ3.</mixed-citation></ref><ref id="B14"><mixed-citation>Current cyber threats: The first quarter of 2022. URL: https://clck.ru/32BQoD</mixed-citation></ref><ref id="B15"><mixed-citation>Maslova M.A., Kostikov V.A. Using the voice identification system as an additional user protection // Modern problems of radio electronics and telecommunications. &amp;ndash; 2021. &amp;ndash; № 4. &amp;ndash; P. 223.</mixed-citation></ref></ref-list></back></article>