A-Z Popular New Security Search »
Information Security
 
Related Guides

8 Types of Multi-Factor Authentication

 , updated on
Multi-factor authentication is a process of verifying identity using at least two independent factors including what a person knows, possesses and physical attributes of a person such as their voice. The following are common factors that are used in multi-factor authentication processes.

Passcode

A numeric password such as a personal identification number (pin).

Password

A user created string of characters.

Challenge / Response

Answers to challenge questions that may include obscure personal information.

Magnetic Stripe Cards

Cards that contain data such as identification numbers written on magnetic storage media. May include other security features such as an employee id card with a photo on the front.

Card Security Codes

Codes that are physically written on a card. Users are asked to input the code to show they are in possession of the card. In some cases, multiple codes are written in a grid and users are asked to enter the code from a particular row and column.

Smart Cards

Cards that have embedded computing capabilities that typically include authentication credentials such as public key certificates.

Security Tokens

Hardware such as a USB device or mobile phone that generate time-synchronized tokens based on a shared key with an authentication service. Such devices may directly interface with authentication services. Alternatively, they may display a time-synchronized one-time password for users to input.

Biometrics

Biometrics such as voice recognition or fingerprint scans.
Overview: Multi-Factor Authentication
Type
Definition
Verifying identity using multiple factors including knowledge, possessions and biometrics such as voice.
Also Known As
Two-factor authentication
2FA
Three-factor authentication
3FA
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Authentication

A list of authentication techniques and considerations.

Password Entropy

An overview of password entropy.

Identification vs Authentication

The difference between identification and authorization.

Authentication vs Authorization

A few examples of the difference between authentication and authorization.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map