. What Is Two Factor Authentication

Topics: Authentication, Password, Credit card Pages: 2 (426 words) Published: February 19, 2013
1) It means “something you know” and “something you have”. Something you know could be the password which is the basic tool for authentication. Something you have could be a phone, smart card or code sheet. Also “something you are” is another way to be authenticated. Such as, finger or hand print, voice print, signature or retinal scan. Google’s “2 step verification” could be an example. Google ask to the customer a unique verification code which is send to their phone, beside the password. 2) Apple and Amazon. (Hackers reach some part of his credit card information via Amazon and Apple tech support gave the hackers access to his iCloud account) 3) Hackers changed the password and cut the access of the user with his account. 4) To take over his Twitter account.

5) Billing address and the last four digits of the credit card number. 6) e-mail address, last four digits of the credit card number on file and billing address. 7) Once hackers access to the me.com account they use this address to change the google password via the recovery e-mail. They find google account via his personal web page. 8) 1password is such an application that offers to the customers a secure access to all passwords and necessary information with one password. 9) Hex data is the raw data which includes hexadecimal symbols. Hex data consist of 16 unique symbols (numbers 0 to 9 and letters A to F). 10) There is no specific information in Apple’s security and privacy information about any improvement or change in their security procedures.  11) Google introduced “2-step verification” system as two factor authentication to protect customers from hacker events. 12) It means a separated account which doesn’t have a link to others and use it for keeping and managing the passwords of other applications and accounts. 13) a-z (26), A-Z (26), 0-9 (10), $%&/=?! (7)

Possible alternatives=698  
14) When a user of an account approves the...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • What is authentication Essay
  • Multi factor authentication Essay
  • Design a Multi-Factor Authentication Process Essay
  • Herzberg's Two Factor Theory Essay
  • Herzberg’s two-factor theory Essay
  • Two Environmental Factors of the Us Essay
  • Two factors in evaluating leadership Essay
  • Two Factor Theory Research Paper

Become a StudyMode Member

Sign Up - It's Free