Difference between revisions of "2 factor authentication"
m |
|||
Line 2: | Line 2: | ||
|Scenario Task Format=Solution | |Scenario Task Format=Solution | ||
|Scenario Task Parent=I want to protect my email account from unauthorised access | |Scenario Task Parent=I want to protect my email account from unauthorised access | ||
− | |Scenario Task Type= | + | |Scenario Task Type=Unauthorised Access |
|Scenario Task Description=[https://en.wikipedia.org/wiki/Two-factor_authentication 2-factor authentication] also known as 2-step and 2fa is a method of authenticating yourself with a combination of two components: something you know (a password) and something you have (e.g. a mobile phone). The idea behind this method is that it's incredibly difficult for the hacker to have access to both components. The service must be offered by your email provider and many of them do now. Please have a look at this excellent report by Citizen Lab on [https://citizenlab.org/2015/08/iran_two_factor_phishing/ 2fa phishing attacks], in particular the conclusions and recommendations within. | |Scenario Task Description=[https://en.wikipedia.org/wiki/Two-factor_authentication 2-factor authentication] also known as 2-step and 2fa is a method of authenticating yourself with a combination of two components: something you know (a password) and something you have (e.g. a mobile phone). The idea behind this method is that it's incredibly difficult for the hacker to have access to both components. The service must be offered by your email provider and many of them do now. Please have a look at this excellent report by Citizen Lab on [https://citizenlab.org/2015/08/iran_two_factor_phishing/ 2fa phishing attacks], in particular the conclusions and recommendations within. | ||
Revision as of 21:59, 24 November 2015
Solution- Unauthorised Access
2-factor authentication also known as 2-step and 2fa is a method of authenticating yourself with a combination of two components: something you know (a password) and something you have (e.g. a mobile phone). The idea behind this method is that it's incredibly difficult for the hacker to have access to both components. The service must be offered by your email provider and many of them do now. Please have a look at this excellent report by Citizen Lab on 2fa phishing attacks, in particular the conclusions and recommendations within.
- Google 2-step verification and the Authenticator application for your smartphone that allows you to generate codes without Internet access
- Hotmail 2-step verification
- Yahoo 2-step verification
- Facebook Login Approval
- Twitter Login Verification
Here's a list of other popular online services that provide 2fa.
Base Page | Language | Modification dateThis property is a special property in this wiki. | |
---|---|---|---|
Fa/تأیید دوعاملی | 2 factor authentication | fa | 13 March 2016 10:50:10 |
Ru/Двухфакторная авторизация | 2 factor authentication | ru | 10 March 2016 10:48:29 |