Risk-Based Authentication is not standardized at the moment. For this reason, several types of RBA algorithms and implementations exist.
Based on our observations we were able to derive three types of conceptual RBA models.
Used by: GOG.com
| Advantages | Disadvantages |
|---|---|
|
Used by: Google, Amazon, LinkedIn
| Advantages | Disadvantages |
|---|---|
|
Used by: Facebook
| Advantages | Disadvantages |
|---|---|
|
|