Page 43 - Cyber Safety C-6
P. 43
Here is how it works:
1. Something you know- First, you enter your password.
2. Something you have- Then, you enter a second piece of information, such as a code sent to
your phone or email.
By using 2FA, even if someone guesses your password, they will not be able to access your account
because they will not have the second piece of information (the code).
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA) is similar to 2FA but goes further. It requires you to provide
three or more pieces of information to prove your identity.
Regularly check
for suspicious login
attempts or changes.
Here are some common factors used in MFA:
1. Something you know – like a password or PIN.
2. Something you have – like a phone or security token that generates a code.
3. Something you are – like a fingerprint, face scan or voice recognition.
For example, when logging into an account, you might need to:
Enter your password (something you know),
Then, enter a code sent to your phone (something you have),
Finally, scan your face or fingerprint (something you are).
Digital Secrets: Private Information and Strong Passwords 41

