0% found this document useful (0 votes)
5 views

1b-Two-factor-authentication-session-overview

Two-factor authentication (2FA) is a security measure that requires two steps to verify a user's identity, typically involving a password and a second factor like a code sent to a mobile phone. This process helps prevent unauthorized access to accounts, even if a password is compromised. Various methods of 2FA include SMS passcodes, email verification, and biometric scans like fingerprints.

Uploaded by

asraraltarykh41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

1b-Two-factor-authentication-session-overview

Two-factor authentication (2FA) is a security measure that requires two steps to verify a user's identity, typically involving a password and a second factor like a code sent to a mobile phone. This process helps prevent unauthorized access to accounts, even if a password is compromised. Various methods of 2FA include SMS passcodes, email verification, and biometric scans like fingerprints.

Uploaded by

asraraltarykh41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Cyber Sprinters: Activity 1b

Two-factor authentication
What is two-factor authentication?
• A way to stop hackers getting into your
accounts, even if they know your password.
• It’s called ‘Two-factor’ because you provide 2
factors (or steps) to authenticate yourself.
• Authenticate is a fancy way of saying (‘prove
you are who you say you are’).
• If you’ve been asked to enter a code when
accessing Netflix/Amazon Prime, you’ve
already used 2-factor authentication!
How does two-factor authentication work?
• Imagine you’re trying to access a shopping site.
• You’ll be asked to enter your password (the first step),
but also a second step.
• This is often a passcode that’s sent to
your mobile phone.
• You need to enter your password and the
code to prove that’s it’s really you.
Different types of two-factor authentication
• Entering a passcode code that you’ve sent been sent it just one
type of authentication.
• You could be asked to enter click a button or enter a code that’s
been sent to your email address.
• You could be asked to use your fingerprint scanner.
• Let’s have a look at how these might work in more detail.
Two-factor authentication: text message (SMS)
• When you log on, the company
send a passcode to your phone.
• You enter the passcode.
• The company know that it’s you
(and not a criminal who has your
password).
• You’re allowed access!
Two-factor authentication: fingerprint scanner
• When you log on, the company asks you
to scan your fingerprint.
• You scan your fingerprint.
• The company know that it’s you
(and not a criminal who has your
password).
• You’re allowed access!
Two-factor authentication: email
• When you log on, the company
sends you an email.
• You open the email, and click the
button (or enter a passcode).
• The company know that it’s you
(and not a criminal who has your
password).
• You’re allowed access!
Two-factor authentication: what have we learned?
• Accounts that have been set up with two-factor authentication have
an extra layer of security.
• It stops anyone who might know your password from getting in.
• There are different ways you can prove that it’s really you.
• passcode
• email
• fingerprint
• It’s often shortened to 2FA.
• Authentication means ‘proving it’s really you’.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy