Friday, September 11, 2020

Word of the Day & Pop Quiz: 2FA

 
Word of the Day & Pop Quiz WhatIs.com
Daily updates on the latest technology terms | September 11, 2020

2FA

Two-factor authentication (2FA) is a verification process in which the user provides two different authentication factors to prove their identity. Credentials can be based on knowledge, possession, inherence, location or time.

The goal of 2FA is to create a layered defense and make it more difficult for an unauthorized person to access a target such as a physical location, computing device, network or database. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target.

 

Two-factor authentication is a type of multifactor authentication (MFA). Technically, it is in use any time two authentication factors are required to gain access to a system or service. However, using two factors from the same category doesn't constitute 2FA; for example, requiring a password and a shared secret is still considered SFA as they both belong to the same authentication factor type -- knowledge. Continue reading...


 

Take today's Pop Quiz!

 

1. User names and passwords are examples of __________ authentication factors.

Answer

 

2. Security tokens and USB security keys are examples of _________ authentication factors.

Answer

 

3. Fingerprints and iris scans are examples of _______ authentication factors.

Answer

 

4. NTP is a protocol used to synchronize computer clock times in a network. It is one of the oldest parts of the TCP/IP protocol suite. What does NTP stand for?

a. Network Tempo Protocol

b. Network Time Protocol

Answer

 

5. Location awareness is a type of ___________ technology that delivers information about a device's physical location to another user or application.

a. presence

b. presents

Answer

Today's Takeaway

 

"Two-factor authentication does not authenticate an individual. It authenticates the device. It's what we call in the industry identity approximation." - Scott Robinson

Watch and Learn

 

CIA Triad

Be mindful of the CIA -- no, not that one. We're talking about the CIA triad in information technology. Watch to learn more about what it is, how it supports information security and why it's one of our most popular definitions.

Continue Learning

 


Zoom adds two-factor authentication for all users

The latest enhancements to Zoom security make it easier for organizations to protect users and prevent unauthorised meeting access.

 

Identity management vs. authentication: Know the difference
Andrew Froehlich breaks down how authentication and identity management differ and how each of them are intrinsic to an identity and access management framework.

What are the most common digital authentication methods?
In order to build and maintain a comprehensive access management program, enterprise leaders must get to know the various forms of digital authentication at their disposal.

Two-factor authentication is broken: What comes next?
Two-factor authentication is seen by many as a robust authentication method, but is it really as impervious as it seems?

6 persistent enterprise authentication security issues
Some authentication factors are considered more secure than others but still come with potential drawbacks. Learn about the most common enterprise authentication security issues.

Passwordless authentication options and best practices
Organizations that want to move away from passwords for authentication should learn the best practices for implementing passwordless authentication and which factors fit them best.

Pop Quiz Answer Key

 

Stay in Touch

 

Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact me at mrouse@techtarget.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: