Page 43 - Cyber Safety C-6
P. 43

Here is how it works:
                 1.  Something you know- First, you enter your password.

                 2.  Something you have- Then, you enter a second piece of information, such as a code sent to
                    your phone or email.

                 By using 2FA, even if someone guesses your password, they will not be able to access your account
                 because they will not have the second piece of information (the code).

                 Multi-Factor Authentication (MFA)

                 Multi-Factor Authentication (MFA) is similar to 2FA but goes further. It requires you to provide
                 three or more pieces of information to prove your identity.









                                                                                      Regularly check
                                                                                    for suspicious login
                                                                                   attempts or changes.





                 Here are some common factors used in MFA:

                 1.  Something you know – like a password or PIN.

                 2.  Something you have – like a phone or security token that generates a code.
                 3.  Something you are – like a fingerprint, face scan or voice recognition.

                 For example, when logging into an account, you might need to:

                     Enter your password (something you know),
                     Then, enter a code sent to your phone (something you have),

                     Finally, scan your face or fingerprint (something you are).


                                                                 Digital Secrets: Private Information and Strong Passwords  41
   38   39   40   41   42   43   44   45   46   47   48