- Practical Network Scanning
- Ajay Singh Chauhan
- 208字
- 2022-07-12 10:43:10
Two factor authentication
Two-Factor Authentication (2FA) is an optional layer of security which adds another level of protection to your account. This process combines something you have (a token or code) with something you know (a password). Two-factor authentication is more effective in securing account access than a password alone, making it more difficult for attackers to access your accounts since they become dynamic in nature. The two common methods of 2FA are as follows:
- Authentication App or Token: Generate a security code using a trusted app or security RSA token
- SMS Verification: Send a security code to the phone number linked to your account via an SMS text message
An example of two-factor authentication:
Most banks now have two-factor authentication available to their customers. A good example of network administration is to combine an RSA feature with Cisco TACACS or Radius to gain access for any network device. VPN users must be authenticated with 2FA to validate an identity.
Hardware tokens (in the form of key fobs or card readers) are difficult to maintain due to logistic support and tokens are also usually small and easily lost. 2FA makes life easier by utilizing mobile phone SMS technology.
Following is an image of an RSA Hardware Token:

- Metasploit Penetration Testing Cookbook(Third Edition)
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 零信任網絡:在不可信網絡中構建安全系統
- Practical Network Scanning
- 開發者的Web安全戒律:真實威脅與防御實踐
- API攻防:Web API安全指南
- 網絡安全三十六計:人人該懂的防黑客技巧
- Computer Forensics with FTK
- Kerberos域網絡安全從入門到精通
- 網絡安全態勢感知
- SQL Injection Strategies
- VMware vCloud Security
- 社會工程:防范釣魚欺詐(卷3)
- 計算機網絡安全與應用技術(第2版)
- 計算機病毒揭秘與對抗