Posted by: Margaret Rouse
“A good example of where risk-based authentication is extensively used today is on banking websites. After a customer registers for access to his or her account, if he checks the account from a remote location not previously used to access the account or uses a system never used before, the risk-based authentication system recognizes this fact. ” – Randall Gamby
Today’s WhatIs.com Word of the Day is risk-based authentication, applying more rigorous standards for granting access when there is an indication that someone might not be who he says he is. You may have experienced risk-based authentication if you’ve ever accessed your bank account from another country and were asked more than the usual number of security questions. Common criteria for assessing risk includes geographic location, IP address and the status of antivirus software.