Two-Factor Authentication(2FA)


2-Factor Authentication(2FA) is known as two step verification.It is a security process,users provide two security factors during login process.
still most of the peoples using Single-Factor Authentication(SFA),a security process done with single security factor is called as SFA,like passwords.But SFA is not enough to protect your social account from cyber attacks.Most of the users passwords be like simple seven character words,this type of passwords can be easily cracked within few minutes.Some social sign up forms have password meter to measure either your password is strong or week.Password meters will help the user to make passwords more strong by creating password with numerical values,symbols along with characters.And some of the technical guys make their password with salting(hashes a password based on random string or data).

  • 17 percent of users are guarding their accounts with the password "123456".
If your account has protect with password with security question then that's not called 2FA. This method is still considered as a single-factor authentication,as they both are belongs to the same authentication factors.

Authentication factors:

   Authentication factors are classified based on the ways which someone can be authenticated.
  • Knowledge factors : Passwords,PIN,Secret security questions.
  • Possession factors :Id card,security Tag and smart phone.
  • Inherence factors :Bio metrics such as finger prints,face or speech are considered as input.
Implementation of 2-Factor authentication:
     2FA is implemented on several devices and services.Tokens are given to the users in the form of RFID tag or cards to use when logging in,any hardware devices or software apps to authenticate access for users.Authentication tokens are also generated via smartphones by generating PIN codes.
Smartphones have variety of possibilities for 2FA. Some devices have capable of recognizing finger prints, facial recognition , iris scanning and voice recognition.Smartphones are equipped with GPS,so location based authentication also possible in this.And phone call or SMS via authentication may also be used.
   Now Authenticator apps are replaced the voice call and SMS or email authentication.For example if you want to login facebook,you provide your username and password in login form.If you activate the 2FA in facebook, after you hit the enter, your smartphone facebook app will generate a 6 digit code for your second authentication.Google also provides 2FA for your gmail account using Google authenticator. By entering the correct code,the user completes the verification process successfully and proves possession of the correct device(Ownership factor).
    Most of the cyber attacks originate from remote internet connection,so 2FA makes reduce this type of attacks.Because obtaining passwords is not enough to gain access of accounts,unluckily attacker needs one more authentication from your smartphone or physical recognition from yours.
So protect your account from online thieves,have a safe online surf ..!  



Comments