February 16, 2014 by Robert Siciliano — speaker, IDTheftSecurity.com
First, what is knowledge-based authentication? KBA is an authentication method that asks the user to respond to at least one question whose correct answer only that user would know.
There are two types of KBA: 1) a question the user has pre-selected (i.e., static scheme); and 2) a question that's determined by data garnered from public records (i.e., dynamic scheme).
The idea is that if a question is answered correctly, the person's ID has been verified.
KBA flaws
Fraudsters can answer "secret" questions — even those the user might think it would be virtually impossible to answer.
How? Spear-phishing — gaining access to aggregated public data by tricking the aggregators' employees, getting into their accounts, and stealing the "keys" to the data.
Additionally, with of all our personal information floating out there in social sites, it is becoming much easier to research anyone enough to pass these questions.
Knowledge-based authentication is definitely flawed, and it is especially unreliable when it applies to people new to the U.S. or who are young, as they don't have much public data built up.
However, KBA is also the heavily preferred method for ID because it's so technically easy. This is why Obamacare will be using it for the new healthcare insurance exchanges.
Solutions
Authentication should be multifactor. A multidimensional security system might include:
A layered security program should include, at a minimum, the following:
An alternative to KBA
There is a software-only biometric that authenticates a user's identity in a way that no imposter can mimic.
This software, created by Biometric Signature ID, employs the strongest form of ID confirmation available today, and it doesn't require additional hardware.
How does it work?
With a program such as BioSig-ID, the software measures how a person moves his or her mouse, finger or stylus while logging in using a password created within the program.
This SaaS-based software is now used in over 60 countries and was recently awarded a grant by the White House to use the solution to validate user identity before they can access a digital asset.
Elements measured include stroke height, length, speed, direction, and angle. These define the user's unique pattern, which a fraudster cannot replicate. This type of positive ID can be made when the user logs in from any device.
In order to access the device, or the information on it (i.e., bank account, medical information, online college exam, etc.), the user must be authenticated against their original profile.
In seconds, and with only three or four characters, the software can establish whether the person who registered for the account is the same person now attempting to access it.
Robert Siciliano is a personal security and identity theft expert and a BioSig-ID advisory board member. He is the author of "99 Things You Wish You Knew Before Your Mobile Was Hacked!"
Read more about security.