Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

6.2.1. RBAC, MAC, and DAC

💡 First Principle: Authentication factor categories are defined by the independence of the evidence — if compromise of one factor automatically compromises another, they don't provide genuine multi-factor protection. A second "factor" that's derived from the same source as the first (e.g., two different passwords for the same account) provides no additional security beyond single-factor.

The three factor categories:
CategoryDescriptionExamplesPrimary Attack
Something you knowKnowledge factorPassword, PIN, security question, passphraseTheft, guessing, phishing, database breach
Something you havePossession factorHardware token, smart card, mobile authenticator app, SMS OTP, FIDO2 keyTheft of physical device, SIM swap (SMS), cloning
Something you areInherence factorFingerprint, retina scan, iris scan, facial recognition, voice recognitionSpoofing with fake biometric, template theft
Additional factors sometimes cited:
  • Somewhere you are (location): GPS coordinates, IP geolocation, network location. Supplementary control, not a primary factor.
  • Something you do (behavior): Typing cadence, mouse movement patterns (continuous authentication). Emerging; not yet widely deployed as primary factor.
Biometric accuracy metrics:
MetricDefinitionTradeoff
FAR (False Acceptance Rate)Rate at which unauthorized users are acceptedLower FAR = fewer unauthorized acceptances
FRR (False Rejection Rate)Rate at which authorized users are rejectedLower FRR = fewer legitimate user frustrations
CER / EER (Crossover Error Rate / Equal Error Rate)Point where FAR = FRRLower CER = better overall accuracy; the standard comparison metric

FAR and FRR trade off against each other — adjusting the sensitivity threshold reduces one while increasing the other. CER is the balanced operating point and the standard metric for comparing biometric systems. A system with CER of 0.001% is more accurate than one with CER of 0.1%.

MFA strength spectrum:
MFA TypePhishing Resistant?SIM Swap Resistant?Offline Usable?Recommendation
SMS OTP❌ No❌ NoNo⚠️ Avoid for high-value accounts
Email OTP❌ No (email can be phished)N/ANo⚠️ Better than SMS, still phishable
TOTP (Google Auth, Authy)❌ No (code can be phished in real-time)✅ YesYes (offline)✅ Good baseline
Push notification❌ No (MFA fatigue)✅ YesNo✅ Good; add number matching
FIDO2 / Passkey✅ Yes (domain-bound)✅ YesYes✅ Best available
Smart card (PIV/CAC)✅ Yes✅ YesYes✅ Enterprise/government standard

MFA fatigue defense: Push notification MFA sends an approval request to the user's phone. Attackers send repeated requests hoping the user approves one to stop the notifications. Defense: require number matching (user must confirm a code displayed in the login screen matches the one in the push notification) — eliminates approval without awareness.

Passwordless authentication: FIDO2/WebAuthn uses asymmetric key pairs: the private key stays on the device (in a hardware security module or TPM), the public key is registered with the service. At authentication, the service sends a challenge; the device signs it with the private key. The signature proves possession of the registered key. No shared secret, no password to steal or phish.

⚠️ Exam Trap: Biometric authentication is the ONLY factor that cannot be changed if compromised. You can change a password, revoke a smart card, and replace an authenticator app. If a biometric template (the stored fingerprint or iris scan) is stolen from a database, the affected users have permanent exposure — their finger hasn't changed. This is why biometric templates should be stored as encrypted, salted one-way transformations rather than raw templates, and why biometrics alone are rarely sufficient for high-security authentication.

Reflection Question: An organization is deploying MFA for 5,000 remote employees. The CISO wants to choose between SMS OTP, TOTP authenticator apps, and FIDO2 hardware keys. Compare the cost, usability, and security tradeoffs of each option, and recommend an approach for two tiers: general employees and the 200 privileged IT administrators.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications