Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
6 Cards in this Set
- Front
- Back
List of all 5 authentication factors |
1. Knowledge factors... something you know. Knowledge factors require the user to provide some data or information before they can access a secured system.
2. Possession factors... something you have. Possession factors require the user to possess a specific piece of information or device before they can be granted access to a system. OTP (one time passwords) are an example, as are security RFID cards.
3. Inherence factors... something you are. Inherence factors authenticate access credentials based on factors that are unique to the user, e.g.fingerprints, retinal scan, etc.
4. Location factors... somewhere you are. Location factors can be implemented by network administrators using geolocation security checks to verify the location of the user before granting access to a network, system, or application.
5. Behavior factors... something you do. Behavior factors are based on actions undertaken by the user to gain access to the system, e.g. drawing a pattern in dots on a phone screen.
|
|
First authentication factor |
Knowledge factors... something you know. Knowledge factors require the user to provide some data or information before they can access a secured system. |
|
Second authentication factor |
Possession factors... something you have. Possession factors require the user to possess a specific piece of information or device before they can be granted access to a system. OTP (one time passwords) are an example, as are security RFID cards. |
|
Third authentication factor |
Inherence factors... something you are. Inherence factors authenticate access credentials based on factors that are unique to the user, e.g.fingerprints, retinal scan, etc. |
|
Fourth authentication factor |
Location factors... somewhere you are. Location factors can be implemented by network administrators using geolocation security checks to verify the location of the user before granting access to a network, system, or application. |
|
Fifth authentication factor |
Behavior factors... something you do. Behavior factors are based on actions undertaken by the user to gain access to the system, e.g. drawing a pattern in dots on a phone screen. |