2-Factor Authentication(2FA) is known as two step verification.It is a security process,users provide two security factors during login process.
- 17 percent of users are guarding their accounts with the password "123456".
Authentication factors:
Authentication factors are classified based on the ways which someone can be authenticated.
- Knowledge factors : Passwords,PIN,Secret security questions.
- Possession factors :Id card,security Tag and smart phone.
- Inherence factors :Bio metrics such as finger prints,face or speech are considered as input.
2FA is implemented on several devices and services.Tokens are given to the users in the form of RFID tag or cards to use when logging in,any hardware devices or software apps to authenticate access for users.Authentication tokens are also generated via smartphones by generating PIN codes.
Smartphones have variety of possibilities for 2FA. Some devices have capable of recognizing finger prints, facial recognition , iris scanning and voice recognition.Smartphones are equipped with GPS,so location based authentication also possible in this.And phone call or SMS via authentication may also be used.
Now Authenticator apps are replaced the voice call and SMS or email authentication.For example if you want to login facebook,you provide your username and password in login form.If you activate the 2FA in facebook, after you hit the enter, your smartphone facebook app will generate a 6 digit code for your second authentication.Google also provides 2FA for your gmail account using Google authenticator. By entering the correct code,the user completes the verification process successfully and proves possession of the correct device(Ownership factor).
Most of the cyber attacks originate from remote internet connection,so 2FA makes reduce this type of attacks.Because obtaining passwords is not enough to gain access of accounts,unluckily attacker needs one more authentication from your smartphone or physical recognition from yours.
So protect your account from online thieves,have a safe online surf ..!
Smartphones have variety of possibilities for 2FA. Some devices have capable of recognizing finger prints, facial recognition , iris scanning and voice recognition.Smartphones are equipped with GPS,so location based authentication also possible in this.And phone call or SMS via authentication may also be used.
Now Authenticator apps are replaced the voice call and SMS or email authentication.For example if you want to login facebook,you provide your username and password in login form.If you activate the 2FA in facebook, after you hit the enter, your smartphone facebook app will generate a 6 digit code for your second authentication.Google also provides 2FA for your gmail account using Google authenticator. By entering the correct code,the user completes the verification process successfully and proves possession of the correct device(Ownership factor).
Most of the cyber attacks originate from remote internet connection,so 2FA makes reduce this type of attacks.Because obtaining passwords is not enough to gain access of accounts,unluckily attacker needs one more authentication from your smartphone or physical recognition from yours.
So protect your account from online thieves,have a safe online surf ..!
Comments
Post a Comment