Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

What is Two-Factor Authentication?

It is an authentication process where two of three recognized factors are used to identify a user:

Something you know – usually a password, passcode, passphrase or PIN.
Something you have – a cryptographic smartcard or token, a chip enabled bank card or an RSA SecurID-style token with rotating digits
Something you are – fingerprints, iris patterns, voice prints, or similar

The C.I.A. Triad or C.I.A. Triangle and Other Security Concepts

Information security is the method of providing confidentiality, integrity and availability to data, information, applications and equipment for those who needs it. The key concept to providing such a level of protection falls on the concept of The C.I.A. triangle which consist of:

– Confidentiality
– Integrity
– Availability

What is Two-Factor Authentication?

It is an authentication process where two of three recognized factors are used to identify a user:

Something you know – usually a password, passcode, passphrase or PIN.
Something you have – a cryptographic smartcard or token, a chip enabled bank card or an RSA SecurID-style token with rotating digits
Something you are – fingerprints, iris patterns, voice prints, or similar

The C.I.A. Triad or C.I.A. Triangle and Other Security Concepts

Information security is the method of providing confidentiality, integrity and availability to data, information, applications and equipment for those who needs it. The key concept to providing such a level of protection falls on the concept of The C.I.A. triangle which consist of:

– Confidentiality
– Integrity
– Availability