Two-factor authentication: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Create page. Sources: The Treasurer, Cash Management Edition April 2019 p36 & authy.com webpage https://authy.com/what-is-2fa/)
 
imported>Doug Williamson
(Add quote: Source: https://blogs.treasurers.org/tackling-cyber-risks-in-treasury/.)
Line 10: Line 10:
*Have: for example a credit or debit card, a smartphone, or a small hardware token
*Have: for example a credit or debit card, a smartphone, or a small hardware token
*Are: for example, a fingerprint, iris scan, or voice print
*Are: for example, a fingerprint, iris scan, or voice print
:<span style="color:#4B0082">'''''Keep control'''''</span>
: "... the importance of not relinquishing your own control requirements, as a number of companies that turned off two-factor authentication when they went live with a cloud solution were subsequently breached."
:''Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.''





Revision as of 14:20, 22 May 2019

Security systems.

(2FA).

Two-factor authentication is a principle of security systems requiring additional features on top of standard usernames and passwords.

The additional features may be something you:

  • Know: for example, a personal identification number (PIN), an additional password, answers to “secret questions” or specific keystroke patterns
  • Have: for example a credit or debit card, a smartphone, or a small hardware token
  • Are: for example, a fingerprint, iris scan, or voice print


Keep control
"... the importance of not relinquishing your own control requirements, as a number of companies that turned off two-factor authentication when they went live with a cloud solution were subsequently breached."
Ludwig Keyser, Director of Joint Operations Centre, Barclays - EACT Conference Tackling cyber risks in treasury, January 2019.


See also