Cybersecurity 101: Methods of Authentication
Authentication is how systems make sure you are really you. Without it, anyone could access your accounts, data, or devices. It’s the first and most crucial step in protecting your digital identity.
Last time, we learned what hashing is and why it is so important for basically all IT systems. Today, we take a look at another important Cybersecurity topic: Authentication.
The goal of authentication is simple - to verify a user's identity. But how do systems actually verify who you are?
Let's take a look at the 5 most commonly used authentication techniques:
1. Something You Know
This method relies on information that only you should know. That's why it is often called knowledge-based authentication. The problem with using this type of authentication is that it is often vulnerable to various attacks.
Example:🔑 A password, PIN, or security question.
2. Something You Have
This method relies on proving that you physically possess something, like a smartphone, security token, or smart card.
It’s often combined with “Something You Know” (like a password) for stronger protection.
📩 Subscribe to my Patreon for free so you won’t miss the next posts — especially if you’re just starting your journey into cybersecurity!
3. Something You Are
The most accurate authentication method relies on your biometric data, such as your fingerprint, facial scan, or iris scan. However, it can raise privacy concerns and often requires more expensive technology.
4. Somewhere You Are
Location-based verification using GPS, IP, or device data.
Often used as an additional check when logging in from unfamiliar places.
5. Something You Do
⌨️ Behavioral patterns like how you type, swipe, or move.
Still emerging, but promising for continuous authentication.
Conclusion
Every cybersecurity specialist should understand these methods to choose the most effective and convenient one for each situation.
Keep in mind that using just one authentication method is usually not enough.
That’s why combining methods, like something you know and something you have, is considered best practice for building stronger protection.
👉 Make sure to follow me so you don’t miss the next posts in this series!
🔐 Glossary of Key Terms
Authentication – The process of verifying a user’s identity before granting access.
Two-Factor Authentication (2FA) – A method that combines two types of authentication (e.g., password + phone).
Biometrics – Unique biological traits (like fingerprints or facial features) used to identify individuals.
Security Token – A physical or digital device used to verify identity, often part of 2FA.
Knowledge-Based Authentication – Authentication based on something only the user knows, such as a password or security question.
📩 Subscribe to my Patreon for free so you won’t miss the next posts — especially if you’re just starting your journey into cybersecurity!






Very informative. How can one subscribe to your Patreon? I didn’t see a link.