Amazines Free Article Archive
www.amazines.com - Friday, April 19, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73855)
 Automotive (145712)
 Blogs (75614)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330638)
 Business News (426446)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241953)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20319)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48258)
 Education (185521)
 Electronics (83524)
 Email (6438)
 Entertainment (159854)
 Environment (28970)
 Ezine (3040)
 Ezine Publishing (5453)
 Ezine Sites (1551)
 Family & Parenting (111007)
 Fashion & Cosmetics (196605)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310615)
 Fitness (106469)
 Food & Beverages (63045)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630137)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91657)
 Home Improvement (251211)
 Home Repair (46243)
 Humor (4723)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191031)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80506)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99316)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126700)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80350)
 Science & Technology (110290)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49311)
 Software (83033)
 Spiritual (23516)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308304)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35844)
Author Spotlight
ELLIOT CHANG

Financial analyst and author writing on economy and business. ...more
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more
MANMOHAN SINGH

Digital marketing professional with 8 years of experience. A good listner, Stratgist and fun loving ...more
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
TUSHAR BHATIA

Tushar Bhatia is the Founder President of EmpXtrack Inc with over 19 years of experience in the soft...more


Does 2-Factor Authentication Really Make Your Account Secure? by Alex D





Does 2-Factor Authentication Really Make Your Account Secure? by
Article Posted: 02/15/2015
Article Views: 173
Articles Written: 182
Word Count: 577
Article Votes: 0
AddThis Social Bookmark Button

Does 2-Factor Authentication Really Make Your Account Secure?


 
Internet,Marketing
We all want more security in our lives, especially when it comes to cyber space. We want double layer of protection, double authentication, impeccable secrecy and even want all our communication to travel through secure media. Online services have in the past few years started trying out different methods to impress upon their subscribers and display their serious attitude towards security. 2 Factor Authentication is a word closely associated with passwords and login systems. But does a 2 Factor system really improve security or is it just a hindrance to easily accessing your favourite service or app? This article tries to uncover the pros and cons of 2 factor authentication for login systems.

Components

The main components of 2 factor authentication are mainly "something you know" Eg: A PIN Number, a Password or even the answer to a secret question; "something you have or possess physically" like a Credit Card, a USB Stick, an Auth Dongle, a physical key or even a mobile phone app; "something that is innate to you or is a physical feature" like your fingerprint, your retina, your face, your voice or maybe even your teeth impression. The thing that you know is mostly something unique which cannot be easily guessed or known by a third person. It is something which is a secret or which is obscure, like a password. The Password maybe a combination of some names that you know or are associated with, or they maybe some abstract random words which you have come up with. These are difficult to guess and also tough to identify with even if they are leaked or revealed. The physical token or key that you have is like a second layer of protection, which is a physical possession which only the authorized user should keep or have in their custody. it is only to provide a second layer of protection so that the bank or authority can disclaim their liability in case of wrongful use of your account, after it was authenticated with that physical possession.

Advantages

Like the name suggests, the primary advantage is that it is a 2 step authentication. This attempts to prove your identity by using multiple steps. It offers a double layer of protection by attempting to correlate the authentication with things that only you would have or know. Eg: your mobile phone is something which is almost inseparable from you. You would have it all the time or would know someone who has it all the time. People rarely share mobile phones or USB pen drives. Similarly, passwords and PIN numbers are also rarely shared and rarely revealed to others. Sometimes even the spouse doesn't know his/her partners PIN number or password. Thus ensuring that the person logging in to the system is most definitely the person who is supposed to log in.

Limitations

Mobile Phones, Credit Cards, USB Dongles and even keys maybe stolen and used by an unauthorized person. Voice and even fingerprint recognition devices have been tested to be vulnerable to spoofing and impersonation. Mobile Apps can fail if there is no internet or SMS service at the time of authentication. If your mobile phone is at the repair shop or is not working, you are stuck with choosing some other authentication method or just waiting it out.

Your search for web hosting prices stops here. Get an unlimited hosting plan at the most affordable prices. To know more visit our website.

Related Articles - Unlimited Hosting, Web Hosting Prices, Best Web Hosting, Password, 2 factor authetication, Login, Authentication, Linux Hosting,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license