• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/6

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

6 Cards in this Set

  • Front
  • Back

List of all 5 authentication factors

1. Knowledge factors... something you know. Knowledge factors require the user to provide some data or information before they can access a secured system.



2. Possession factors... something you have. Possession factors require the user to possess a specific piece of information or device before they can be granted access to a system. OTP (one time passwords) are an example, as are security RFID cards.



3. Inherence factors... something you are. Inherence factors authenticate access credentials based on factors that are unique to the user, e.g.fingerprints, retinal scan, etc.



4. Location factors... somewhere you are. Location factors can be implemented by network administrators using geolocation security checks to verify the location of the user before granting access to a network, system, or application.



5. Behavior factors... something you do. Behavior factors are based on actions undertaken by the user to gain access to the system, e.g. drawing a pattern in dots on a phone screen.


First authentication factor

Knowledge factors... something you know. Knowledge factors require the user to provide some data or information before they can access a secured system.

Second authentication factor

Possession factors... something you have. Possession factors require the user to possess a specific piece of information or device before they can be granted access to a system. OTP (one time passwords) are an example, as are security RFID cards.

Third authentication factor

Inherence factors... something you are. Inherence factors authenticate access credentials based on factors that are unique to the user, e.g.fingerprints, retinal scan, etc.

Fourth authentication factor

Location factors... somewhere you are. Location factors can be implemented by network administrators using geolocation security checks to verify the location of the user before granting access to a network, system, or application.

Fifth authentication factor

Behavior factors... something you do. Behavior factors are based on actions undertaken by the user to gain access to the system, e.g. drawing a pattern in dots on a phone screen.