We all know that there are three basic ways to authenticate somebody: something you know, something you have, and something you are. Ive wondered recently though where habits and behavior fit in. This profiling/look for weird stuff philosophy has been used in Intrusion Detection Systems (IDS) forever but is now moving to watching employees on their desktops in hopes of preempting insider attacks. Its even being used as a method for authentication as one company has a tool to observe the cadence with which a password is typed.”]
Source: https://www.csoonline.com/article/2136264/fourth-factor–de–authentication.html