The two
terms, two-step verification, and two-factor authentication are
synonymous, though the former is now being used more widely by the likes of Google, Microsoft,
and Apple as it better conveys how the actual authentication process
works.
In the
past, two-step verification was used to describe processes that used the same
authentication factors, while two-factor authentication described processes
that involved different factors, such as entering a password on a website and
receiving a numerical code on a mobile device. Today, the two terms are both
used to describe authentication that involves a secondary factor that is
different from the first.
Authentication is a vital element
of access control and data security because users can be assigned access rights
and be authorized to perform certain actions only after successful
authentication is performed. The ways in which someone can be authenticated
fall into three categories based on what is known as the factors of
authentication:
- Knowledge factors or something you know, such as a password, PIN, or shared secret;
- Ownership factors or something you have, such as an ID card, hardware or software token, or a mobile phone; and
- Inherence factors -- more commonly called biometrics -- such as fingerprints, face, and voice. It also includes behavioral biometrics such as keystroke dynamics.
Security
research has determined that the best way to establish positive identification
is to use elements from at least two of these factors for verification. Using
multiple factors from the same category doesn't constitute multifactor
authentication; for example, a password and a shared secret don't constitute
2FA because they don't use a different authentication factor. Most people have
experienced the two-step verification or two-factor authentication process when
they withdraw money from an ATM. Money is only dispensed when the correct
combination of a bank card (ownership factor) and a PIN (knowledge factor) are
presented.
Due to the number of phishing
attacks trying to steal users' network credentials or online account passwords,
many online services have introduced 2FA to prevent unauthorized access to
accounts, even if a hacker manages to steal a user's password. To try and
simplify the concept, the term two-step verification is becoming more
commonplace as users are required to provide a second piece of information
after they've provided their password in order to access their account.
Typically, after correctly entering their password (knowledge factor), an
online service will send the user a text message to their phone (ownership
factor) with a unique security code that needs to be entered on the sign-in
page to complete the user verification process.
Enterprises should require that
network administrator and other privileged-access users login into systems
using two-factor authentication tools to ensure that access to
sensitive data remains controlled and compliant. It should also be mandatory
when accessing any systems that store sensitive information because it reduces
the chances of stolen credentials being used to log in to a network or system,
as the attacker also has to have obtained the second authentication factor
required to pass the verification process.
Comments
Post a Comment