dcsimg

299彩票下载

<style id="vPSmi"></style><section id="vPSmi"><mark id="vPSmi"><video id="vPSmi"></video></mark></section>
  1. <audio id="vPSmi"></audio>

          • <legend id="vPSmi"><dl id="vPSmi"><object id="vPSmi"><style id="vPSmi"></style></object></dl><object id="vPSmi"></object></legend>
            <rt id="vPSmi"></rt>
                <canvas id="vPSmi"></canvas>
                  Main » TERM » M »

                  Multi-Factor Authentication (MFA)

                  Multi-Factor Authentication, or MFA, is a form of authenticating users that utilizes more than one method of identification when connecting to a secure site or service. This provides an additional layer of security over traditional forms of single sign-on authentication, which require only one type of identification such as a password.

                  Also known as two-factor authentication, or 2FA, multi-factor authentication can take several forms, but most typically utilizes either a smartphone or a smart card in conjunction with a password or PIN. More advanced forms of MFA will sometimes rely on biometrics such as fingerprint recognition or retina scanning for the second form of authentication.

                  How Multi-Factor Authentication Normally Works

                  A user logging into a site secured with MFA will typically enter a password and then will have a code sent to the smartphone number (or email address) associated with the account. Only after the correct password and the authentication code have been successfully entered will the user be able to access the site or service.

                  While not completely foolproof, MFA does make it harder for hackers to log in to a user’s account, as they would need to have both the user’s password and access to their smartphone or similar device in order to correctly provide both forms of authentication.

                  As a result, MFA is typically deployed for protecting access to more sensitive or mission-critical information within an enterprise. MFA is also increasingly becoming a requirement in government mandates for regulation and compliance.










                  LATEST ARTICLES
                  Texting & Chat Abbreviations

                  From A3 to ZZZ this guide lists 1,500 text message and online chat abbreviations to help you translate and understand today's texting lingo. Read More »

                  List of Well-Known TCP Port Numbers

                  Port numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of port numbers  are specified in... Read More »

                  STUDY GUIDES
                  Computer Architecture Study Guide

                  Computer architecture provides an introduction to system design basics for most computer science students. Read More »

                  Network Fundamentals Study Guide

                  Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

                  The Five Generations of Computers

                  Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »

                  <style id="vPSmi"></style><section id="vPSmi"><mark id="vPSmi"><video id="vPSmi"></video></mark></section>
                  1. <audio id="vPSmi"></audio>

                          • <legend id="vPSmi"><dl id="vPSmi"><object id="vPSmi"><style id="vPSmi"></style></object></dl><object id="vPSmi"></object></legend>
                            <rt id="vPSmi"></rt>
                                <canvas id="vPSmi"></canvas>

                                  <style id="vPSmi"></style><section id="vPSmi"><mark id="vPSmi"><video id="vPSmi"></video></mark></section>
                                  1. <audio id="vPSmi"></audio>

                                          • <legend id="vPSmi"><dl id="vPSmi"><object id="vPSmi"><style id="vPSmi"></style></object></dl><object id="vPSmi"></object></legend>
                                            <rt id="vPSmi"></rt>
                                                <canvas id="vPSmi"></canvas>