Cybersecurity Reference > Glossary
What is Knowledge-Based Authentication (KBA)?
There are two flavors. Static KBA relies on answers set up ahead of time: your password, your mother's maiden name, the street you grew up on. Dynamic KBA takes a different approach, pulling questions from databases of public records and commercial information. You might be asked which bank held your first auto loan, or which of four addresses you lived at in 2015, or what color your third car was.
Static KBA has serious problems. Passwords get reused, stolen, phished, and cracked. Security questions often have answers that aren't actually secret—a determined attacker can find your mother's maiden name or your first pet's name with some basic research. Dynamic KBA sounds more secure because the questions aren't predictable, but it brings its own issues. The information it relies on often exists in data broker databases that have themselves been breached. And while dynamic KBA can be harder to guess, it also fails legitimate users more often, especially people with thin credit files or non-traditional life paths. The method also raises privacy concerns, since it requires systems to access or store detailed personal history that goes well beyond what's needed for the actual service.
Origin
Security questions appeared later as a password recovery mechanism. Banks and financial institutions popularized them in the 1990s as telephone banking grew. When call centers needed to verify customers remotely, asking for personal facts seemed like a reasonable approach.
Dynamic KBA emerged in the early 2000s as credit bureaus and data brokers realized their massive databases could serve a new purpose. Companies like credit agencies already held detailed consumer histories—loans, addresses, phone numbers, property records. Turning this into authentication questions created a new revenue stream while promising better security than static questions.
The technique found particular favor in financial services and healthcare, where regulatory pressure demanded stronger verification but hardware tokens seemed too expensive or cumbersome. For a while, dynamic KBA appeared to offer a middle path: stronger than passwords, easier than physical devices. That optimism has faded as data breaches have made the supposedly private information increasingly public.
Why It Matters
The rise of social media has made static KBA especially problematic. People volunteer their pet's name, their high school, and their hometown on public profiles. Data breaches compound the problem—massive leaks have exposed the "secret" answers of hundreds of millions of users. Even dynamic KBA has grown weaker as breaches at credit bureaus and data brokers put supposedly non-public information into criminal hands.
The bigger issue is that KBA fundamentally conflicts with modern identity security principles. It's a single factor pretending to be strong authentication. It's vulnerable to social engineering and database compromise. It creates a honeypot of personal information that becomes a target itself. Yet organizations continue using it because it's familiar, cheap, and doesn't require users to install apps or carry tokens. This creates real risk, particularly in sectors like healthcare and finance where account compromise has serious consequences beyond mere inconvenience.
The Plurilock Advantage
Our team designs and deploys solutions that replace knowledge-based methods with phishing-resistant authentication, risk-based access controls, and properly implemented multi-factor systems.
We work with your existing environment and business requirements to find the right balance between security and usability—eliminating authentication methods that create more risk than they prevent. Learn more about our identity and access management services.
.




