Types of Multi-factor Authentication Evidence

MFA diagram

Knowledge

Possession

Physical token image — disconnected tokens and connected tokens
Connected token and disconnected token by RSA

Inherent

Location

Time

--

--

--

Software Engineer, React.js || Javascript || RoR

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Cyber Attacks on Critical Infrastructures

Sauna — HackTheBox

ICON (ICX) Project: How to Open a MyIconWallet Mobile Wallet

WTM9JA: Women Online Safety Hackathon

Why You Think Your Gmail Account Was Hacked

Right-To-Be-Forgotten & The New Era Of Personal Data Rights

Managing Cybersecurity as a Business Strategy

Securing yourself online

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Pan Li

Pan Li

Software Engineer, React.js || Javascript || RoR

More from Medium

Importance of QA Testing in Software Development

𝐁𝐢𝐧𝐚𝐫𝐲 𝐒𝐞𝐚𝐫𝐜𝐡 𝐈𝐧 𝐎𝐧𝐞 𝐅𝐫𝐚𝐦𝐞

OAuth and Keycloak : Single Sign On

Automated Testing with Robot Framework: Here Are The Things You Need To Know