Learning Library

← Back to Library

Balancing Security and Usability with Risk-Based Authentication

Key Points

  • Authentication relies on three factor types: something you know (password/PIN), something you have (a registered device like a mobile phone), and something you are (biometric traits such as fingerprint or facial recognition).
  • Each factor has inherent vulnerabilities: passwords can be stolen or shared, devices can be lost or taken, and biometrics can be spoofed or matched to similar individuals.
  • Security and usability exist on a continuum—overly strict authentication creates user friction, while overly lax controls leave systems exposed.
  • Risk‑based authentication combines one or more of these factors with contextual risk assessments to enable adaptive, fine‑grained multi‑factor security that balances protection with convenience.

Full Transcript

# Balancing Security and Usability with Risk-Based Authentication **Source:** [https://www.youtube.com/watch?v=n2eT3JRGAM4](https://www.youtube.com/watch?v=n2eT3JRGAM4) **Duration:** 00:13:25 ## Summary - Authentication relies on three factor types: something you know (password/PIN), something you have (a registered device like a mobile phone), and something you are (biometric traits such as fingerprint or facial recognition). - Each factor has inherent vulnerabilities: passwords can be stolen or shared, devices can be lost or taken, and biometrics can be spoofed or matched to similar individuals. - Security and usability exist on a continuum—overly strict authentication creates user friction, while overly lax controls leave systems exposed. - Risk‑based authentication combines one or more of these factors with contextual risk assessments to enable adaptive, fine‑grained multi‑factor security that balances protection with convenience. ## Sections - [00:00:00](https://www.youtube.com/watch?v=n2eT3JRGAM4&t=0s) **Three Pillars of Authentication** - The speaker explains the three main authentication factors—something you know, something you have, and something you are—and highlights the inherent security risks of each. - [00:03:08](https://www.youtube.com/watch?v=n2eT3JRGAM4&t=188s) **Risk vs Trust in Authentication** - The speaker explains that as risk rises, trust falls, and in risk‑based authentication this leads to either restricted access or additional verification steps depending on the risk level. - [00:06:13](https://www.youtube.com/watch?v=n2eT3JRGAM4&t=373s) **Behavior‑Based Adaptive Authentication** - The speaker outlines how systems evaluate user behavior such as login timing, session duration, failed attempts, and device context to adjust trust levels and trigger additional identity verification. - [00:09:17](https://www.youtube.com/watch?v=n2eT3JRGAM4&t=557s) **Risk-Based Authentication Decision Factors** - The speaker explains how factors such as impossible travel, IP reputation, and transaction sensitivity are evaluated to deny or grant access beyond simple credentials. - [00:12:25](https://www.youtube.com/watch?v=n2eT3JRGAM4&t=745s) **Adaptive Risk‑Based Authentication Explained** - The speaker explains how incorporating behavior, device context, and transaction sensitivity enables adaptive (risk‑based) authentication that tailors security levels while reducing user friction. ## Full Transcript
0:00Who are you? 0:03And how do you prove it? 0:04Especially if you're trying to do it at opposite ends of a wire. 0:08Well, you can't just take your ID and hold it up to the computer screen 0:11and expect that that's going to work. It won't. 0:14So how do we prove who we are when we're on IT systems. 0:18Well, that's the process of authentication. 0:21And there are different ways that we do it. 0:23One is based upon something you know. 0:26Something you know might be a secret, 0:28a password that only you know, or a PIN. 0:32So something like that. 0:33We also might do it based upon something you have. 0:37So that is a specific device. 0:39Very often these days, that would be your mobile phone 0:41because most people aren't separated from those for very long. 0:44So you have that specific device and we register in advance. 0:48And then the other way is based upon something you are. 0:51This is some physical characteristic of you. 0:54Your face print, your fingerprint, your maybe voice print, 0:58some sort of biometric. 1:00Now these are the ways that we do authentication 1:03based upon something, you know, something you have, or something you are. 1:06But each one of these has a certain amount 1:09of risk associated with them. 1:12In fact, something you know, 1:14well, knowledge is something that can exist in actually two brains at the same time. 1:20So if I steal your password, I might know it as well. 1:23And therefore I could log in as you. 1:26Your device, maybe I steal it from you. 1:29Now you don't have it anymore. 1:31And I authenticate as you, even though I'm not you. 1:34So that has a weakness. 1:36And biometrics also have weaknesses in that someone may have 1:40similar physical characteristics and they may be similar enough. 1:44Or maybe there's a way to fake out the biometric reader 1:47and make it think that you're someone that you're actually not. 1:51So in other words, all of these have inherent weaknesses, 1:54but we're also looking at trying to make this authentication process 1:58one where we're having to consider a continuum 2:02between security on one end 2:04and usability or convenience, 2:07on the other end. 2:08If we make it too secure, 2:11in fact, we've locked it down to such a point 2:13that there's a lot of friction introduced for the user, 2:16and they're not going to be happy about that. 2:18And the opposite end is, 2:20if we make it so easy, in other words, like put no lock on the front door, 2:24then anybody can walk in. 2:25It's very usable, very accessible, very convenient. 2:28But then there's no security. 2:30So where is the right place along this continuum? 2:33Well, in fact, what we're going to take a look at in this video is risk based authentication. 2:38We're going to throw risk into the consideration. 2:40And look at these factors which oftentimes we will use in combination. 2:45For instance if I take something you know and something you have 2:48or something you have and something you are 2:50or something you know and something you are, 2:53or all three of those. 2:54We call that multi-factor authentication. 2:57What if I consider not only these factors, 2:59but some other things and create a risk-based calculation 3:04that then lets me do more fine-grained authentication decisions? 3:08That's what we're going to look at in this video. 3:10Okay, let's take a look at this relationship between risk and trust. 3:14It turns out that as risk increases. 3:17Well, guess what? 3:18Trust will decrease. 3:21And conversely, the opposite happens. 3:23If risk goes down, then our sense of trust should be increasing. 3:28Now let's think about that when it comes to authentication 3:31and specifically risk-based authentication. 3:34So that means if I've got a very high risk 3:38scenario based upon how I've judged it to be, 3:41then I'm not going to trust it very much and I might limit some capabilities. 3:45Let's take a look at an example of what that might be. 3:47So let's say we're over here on this end of the spectrum 3:50and we'll say it's a low risk situation. 3:54So low risk, high trust. 3:56Probably what we're going to say in that case is allow it. 4:00They've logged in and what they were trying to do 4:02wasn't really all that risky to begin with. 4:04And the information they've given me gives me a lot of confidence and trust. 4:08So we're going to allow it. 4:09How about the next case? 4:11Let's say we're in a medium case where we've got medium risk involved here. 4:16Well now I have a couple of choices. 4:18I could either limit what their access is 4:21and say, okay, I sort of trust you. 4:24I sort of don't. 4:25So I'm going to only let you do these things, but not those things. 4:29Or I might do something where I end up asking for additional factors. 4:34So I'm going to look at other things, the context about the transaction. 4:40I may also do something that would cause you to have to reauthenticate later. 4:44So we could make a decision on either of those kinds of things. 4:48And then finally, if we judge it to be a high risk situation, well, guess what? 4:54We're probably just going to say no. 4:56We're not going to allow that. 4:57Although we'll look at a scenario where we might be able to, 5:01maybe make some adjustments in that case. 5:03Okay, let's take a look at what some of those risk factors would be. 5:06What kinds of things would help us determine whether we can trust 5:10this authentication, this proof of who a person is, or not? 5:14Well, I've already talked about the basics, 5:16and those are the things that you know, something you have, something you are. 5:21And a lot of times, as I said, we use these in multiple combinations. 5:25Multi-factor authentication. 5:27So that's the basic stuff here, right? 5:29Well, there's another one that actually fits into this as well. 5:32That's, kind of unusual one, 5:34it's called a behavioral biometric. 5:36So we're looking at how a person actually 5:40does something, not just the physical characteristic of what they look like. 5:44But for instance, one of these might be the way you type in your password. 5:48It turns out people type differently, 5:50and they'll pause in a micro way on just one key versus another. 5:55So if we profile that, then we could, with some degree of of confidence, 6:00say that we think it's you because the way you typed your password, 6:03and the speed, the way you hesitated, all that matches. 6:06That's a behavioral biometric that would fit into those authentication types. 6:11How about some of the other things that we could consider here? 6:13Well, other things in terms of the way the user, once they're on the system, 6:17different kinds of behaviors may also factor into this. 6:21So for instance, we may look at at the times that you log in, 6:26we may even have restrictions. 6:27Like we know, for instance, your job is Monday through Friday, 9 to 5. 6:32And if you're trying to log in on Saturday at 2 a.m.? 6:35No. The answer is no. 6:37I don't care if you've got all the rest of this right. 6:39That still doesn't look right. 6:41We could also look at duration, 6:43the amount of time you spend on the system, typically, 6:46and find out if that looks like it's out of sync. 6:50You know, you're not normally on for this amount of time. 6:53So we're either going to reauthenticate you and challenge you 6:56to prove your identity again, or something along those lines. 7:00Some other things that we could look at is failure cases. 7:03So the number of failures that you've had. 7:05You've logged in and you've been generally successful at doing this. 7:08And now all of a sudden you can't seem to log in anymore. 7:11You've had a large abnormal number of failed login attempts. 7:15And therefore that is going to make us 7:18feel this is a higher risk and we're going to have lower trust. 7:21So what are some other things that we can consider? 7:23How about a broader context for a particular transaction. 7:26So we might for instance look at the device that you're using 7:31and say okay, if you're using one type of device 7:35then we're going to trust it more than another type of device, 7:38or this is the type of device you normally use 7:41and now you're using a different one. 7:42So we think that might, in fact, infer that there's more risk in this. 7:48We might also look not only at the type that I mentioned, 7:52but we could also look at the configuration of the device. 7:56So I might, for instance, say you should have 7:58certain security software installed on your device. 8:01And if you have that, I have more confidence than if you don't have that. 8:06Another thing is to look if the device has been jailbroken. 8:09So if there's been a jailbreak on the device, then I really can't trust it. 8:15In other words, 8:16someone has modified the operating system and therefore it could have malware. 8:20It could have all kinds of things going on with it. 8:22So if I see these kinds of things or the absence of those things, 8:26it would give me more or less trust in that situation. 8:29How about geographical location? 8:32So if you normally log in from the US 8:36and then suddenly you're logging in from the other side of the world, 8:39then I'm going to say, 8:41that really is not what we're expecting from you. 8:44So your location in that case is wrong. 8:48Now, if it turns out, though, let's say I normally log in from the US 8:53and then I log in from Rome, then you might say that's wrong. 8:57Unless I was supposed to be in Rome in the first place. 8:59In which case logging in from the US would have been the incorrect case. 9:04So sometimes you have to understand 9:06the context as well, and it's not always static. 9:09It could be, in fact dynamic. 9:11And we need to be able to adjust for those kinds of situations. 9:14Also look for what we call impossible travel. 9:18That is, if I logged in from the US, 9:22let's say New York, and then ten minutes later logged in from Beijing. 9:27Not possible. 9:27I can't be in both of those places. 9:29That's an impossible travel case. 9:31And therefore we want to deny access in that case. 9:36Another one is IP reputation. 9:40Yeah, internet protocol addresses, 9:43your IP address has a reputation as well. 9:46If we know that that IP address has normally been a place where a lot 9:50of malware or hackers have attacked from, then we're going to say, you know what? 9:55I don't care if you got all the rest of this stuff right. 9:57It's really not worth it. 9:59It's too high risk. 10:00But if your IP address generally has been a good actor 10:04on the internet, then I'm going to have more confidence in you. 10:07And I'm going to allow this to go ahead through, 10:10some other things that we could look at would be transactions, 10:12the kind of transaction that you're going to do. 10:15So the type of transaction. 10:18There are certain things, maybe you're checking your balance, 10:20or maybe you're trying to do something that is of higher value. 10:25So now in this case I'm going to consider 10:28some graded trust that goes along with this. 10:31The sensitivity of the transaction. 10:33What kind of information am I trying to get out? 10:36So as you look at this, 10:38there's a lot of different factors that we could take into account. 10:41And in fact, it's a lot more, you see, 10:44than just something you have ,something you are, and 10:46something you know. 10:47I could consider a lot of different things, 10:48put all of these things into the soup, into the algorithm, 10:52and then see what we come out with. 10:54It's a way of creating greater trust by reducing risk. 10:58Alright, let's take a look now at the relationship between risk and sensitivity. 11:04Because these two kind of need to be considered together 11:08when we're looking at a graded trust situation. 11:11So for instance, if I start off with a case where I say risk is high 11:17and the sensitivity of the transaction is high, 11:20I'm probably going to deny that. 11:22On the other hand, if I say risk is low 11:26and the sensitivity is low, 11:28I'm going to allow that to go through. 11:30So those are the two extremes. 11:32Now it gets a little dicier. 11:34Let's say that the sensitivity is high but the risk is low. 11:38Okay. As long as the risk is low 11:39and probably in most cases going to go away and allow that. 11:43However, what about this case? 11:45This is an outlier. 11:46Now risk looks to be high and sensitivity is relatively low. 11:51But because of that high risk I may say you know what I want to do. 11:55Let's challenge you. 11:57Let's do something we call a step-up authentication. 12:00So you gave me something to to prove who you are. 12:03But I considered it to be still fairly high risk. 12:06So maybe I'm going to go rechallenge you 12:08and make you step up your authentication. 12:11In other words, give me additional proofs that you didn't give initially. 12:14So that's another type of option that I might do. 12:17And you might decide different things based upon your policy and your tolerance for risk. 12:22Not everyone has the same tolerance for risk. 12:25But bottom line, as you see, this is a hard problem, authentication. 12:28And it's why we can check things like something, you know, something you have and you are. 12:34And we can determine a certain amount from that. 12:37But if I could add in these additional factors, 12:40things like your behavior, when you're doing these things, 12:44the context of the device, the transactions that you're trying to do 12:48and their level of sensitivity, 12:50I could take all of those things into account 12:52and actually make a better decision. 12:54It's a more complex decision. 12:56But the beauty of this, this gives us risk based authentication. 13:02It's adapting to the situation. 13:04You may also hear the term adaptive access or adaptive authentication. 13:07They're very similar in concept. 13:10So with this I can now adapt my risk 13:14to the level of authentication someone is given. 13:17And that way we end up with what is hopefully 13:20a more frictionless environment for the user 13:22and a more secure situation for the organization.