SUMMARY
The past few months have shown a near constant report of security breaches which have brought into focused attention the subject of user authentication for online services. As a result of continually searching for an effective solution, two-factor authentication (2FA) is escalating to the top as a potential answer; inevitably rendering a few misconceptions in the process. The point to remember is that true 2FA systems use two independent forms of identification to authenticate users. Most 2FA systems use what the user knows and what they have (knowledge and possession) as “authentication factors”. It’s important to note that for an authentication system to be considered as “two-factor”, evidence of at least one of each factor is needed.
- TOYIN ADELAKUN, VICE PRESIDENT, SESTUS
- Viewpoints
- Posted On