Two-factor authentication: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Create page. Sources: The Treasurer, Cash Management Edition April 2019 p36 & authy.com webpage https://authy.com/what-is-2fa/) |
imported>Doug Williamson (Add link.) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 10: | Line 10: | ||
*Have: for example a credit or debit card, a smartphone, or a small hardware token | *Have: for example a credit or debit card, a smartphone, or a small hardware token | ||
*Are: for example, a fingerprint, iris scan, or voice print | *Are: for example, a fingerprint, iris scan, or voice print | ||
:<span style="color:#4B0082">'''''Keep control'''''</span> | |||
: "... the importance of not relinquishing your own control requirements, as a number of companies that turned off two-factor authentication when they went live with a cloud solution were subsequently breached." | |||
:''Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.'' | |||
== See also == | == See also == | ||
* [[3D Secure]] | |||
* [[Behavioural analytics]] | * [[Behavioural analytics]] | ||
* [[Biometric recognition]] | * [[Biometric recognition]] | ||
* [[Strong Customer Authentication]] | |||
* [[Token]] | |||
[[Category:Technology]] | [[Category:Technology]] |
Latest revision as of 19:55, 25 July 2020
Security systems.
(2FA).
Two-factor authentication is a principle of security systems requiring additional features on top of standard usernames and passwords.
The additional features may be something you:
- Know: for example, a personal identification number (PIN), an additional password, answers to “secret questions” or specific keystroke patterns
- Have: for example a credit or debit card, a smartphone, or a small hardware token
- Are: for example, a fingerprint, iris scan, or voice print
- Keep control
- "... the importance of not relinquishing your own control requirements, as a number of companies that turned off two-factor authentication when they went live with a cloud solution were subsequently breached."
- Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.