Activity 01
Comparative Matrix: Authentication Method Trade-offs
Provide small groups with a table listing six authentication methods (password, PIN, SMS OTP, authenticator app, fingerprint, hardware key) and four evaluation criteria (security strength, cost, user friction, recovery if lost). Groups fill in the matrix and rank the methods for three specific use cases: a social media account, a hospital records system, and a personal phone.
Compare the strengths and weaknesses of various authentication methods.
Facilitation TipDuring the Comparative Matrix, circulate to listen for students who are conflating authentication and authorization and ask guiding questions like 'Is this about proving who you are or what you can access?'
What to look forProvide students with three scenarios: 1) logging into a personal email, 2) a doctor accessing patient records, 3) a gamer accessing a private server. Ask them to identify the primary authentication method used in each and suggest one additional security measure (MFA or authorization principle) that should be applied and why.