Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
What is Two-Factor Authentication?
It is an authentication process where two of three recognized factors are used to identify a user:
    Something you know – usually a password, passcode, passphrase or PIN.
    Something you have – a cryptographic smartcard or token, a chip enabled bank card or an RSA SecurID-style token with rotating digits
    Something you are – fingerprints, iris patterns, voice prints, or similar
The C.I.A. Triad or C.I.A. Triangle and Other Security Concepts
Information security is the method of providing confidentiality, integrity and availability to data, information, applications and equipment for those who needs it. The key concept to providing such a level of protection falls on the concept of The C.I.A. triangle which consist of:
– Confidentiality
– Integrity
– Availability
What is Two-Factor Authentication?
It is an authentication process where two of three recognized factors are used to identify a user:
    Something you know – usually a password, passcode, passphrase or PIN.
    Something you have – a cryptographic smartcard or token, a chip enabled bank card or an RSA SecurID-style token with rotating digits
    Something you are – fingerprints, iris patterns, voice prints, or similar
The C.I.A. Triad or C.I.A. Triangle and Other Security Concepts
Information security is the method of providing confidentiality, integrity and availability to data, information, applications and equipment for those who needs it. The key concept to providing such a level of protection falls on the concept of The C.I.A. triangle which consist of:
– Confidentiality
– Integrity
– Availability



