![]() For example, two knowledge-based factors (like a password and security question) could be compromised in a phishing attack, while two physical factors (like a smartphone and USB key) could be stolen by a pickpocket.Ī common combination is using a knowledge-based and a physical factor. Otherwise, the use of two of the same factor, such as two “something you know” factors, runs the risk that both will be compromised at once. Ideally, a 2FA system should incorporate two different types of factors. For example, a user may need to undergo a fingerprint, voiceprint, or iris scan to gain access to something. Something You Are: “Something you are” factors use biometric authentication.These devices can generate or receive one-time access codes that can be entered into an authentication page. ![]() ![]() Something You Have: Something you have may be a smartphone or a physical authentication device like a smartcard or Yubikey.Something You Know: An example of a factor that is “something you know” is a password or the answer to a security question (like the ones used for password resets).Authentication factors are broken into three categories: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |