Resources | Subject Notes | Information Communication Technology ICT
Two-factor authentication (2FA) is an extra layer of security used to protect your online accounts. It requires more than just your password to verify your identity when you log in. This significantly reduces the risk of unauthorized access, even if someone knows your password.
The primary purpose of 2FA is to enhance account security by making it much harder for hackers to gain access. It addresses the vulnerability of passwords being compromised through phishing, data breaches, or brute-force attacks.
2FA works by requiring two different 'factors' of authentication. These factors typically fall into three categories:
Most 2FA implementations use a combination of 'something you know' (password) and 'something you have' (a code generated by an app or sent via SMS).
Here are some of the most common methods used for 2FA:
Imagine you have an email account protected by 2FA. When you try to log in, you'll first enter your password. Then, the email provider will ask you for a second factor, such as a code from your authenticator app or a code sent to your phone. Only if you provide both pieces of information will you be granted access.
Method | Description | Security Level | Pros | Cons |
---|---|---|---|---|
Authenticator App (TOTP) | Generates time-based one-time passwords. | High | Convenient, works offline, resistant to phishing. | Requires a smartphone. |
SMS Codes | Sends one-time codes to your mobile phone. | Medium | Widely supported. | Vulnerable to SMS interception and SIM swapping. |
Security Key (e.g., YubiKey) | Physical USB device that requires a physical touch. | Very High | Highly secure, resistant to phishing. | Requires a physical device, can be lost. |
Biometric Authentication | Uses fingerprints, facial recognition, etc. | High | Convenient, easy to use. | Can be bypassed, privacy concerns. |
Figure: Suggested diagram: A diagram showing a login screen with fields for username/password and a separate field for a 2FA code (e.g., from an authenticator app or SMS). The diagram should visually represent the two-step process.