Settings
Language
Color Theme
What is Multi-Factor Authentication (MFA)?
MFA is a security process in which a user is required to provide two or more authentication factors in order to access a system or service.
What is MFA?
Multi-factor authentication (MFA) is a security process in which a user is required to provide two or more authentication factors in order to access a system or service.
View Options Again
A process that requires two or more factors of authentication in order to access a system.
A technology that infects your computer with malicious software.
A process that determines what level of permission you have once authenticated.
A process that requires a single authentication factor in order to access a system.
Is the following statement True or False:
MFA makes it more difficult for cyber criminals to gain access to systems.
MFA enforces multiple forms of authentication. Because of this, cyber criminals can't log in to services you use, even if they guess or obtain your password through other means. They need to capture the secondary form of authentication, which is typically something you have or something you are.
View Options Again
True
False
Types of MFA
There are several types of MFA, these types can be broadly classified into three categories:
Something you know
Something you have
Something you are
This type of authentication factor requires the user to provide something that only they know, such as a password or a PIN. This is the most common type of authentication factor and is often used as the first layer of protection.
This type of authentication factor requires the user to have possession of something, such as a security token or a smartphone. This type of authentication factor can be used to provide an additional layer of security and can be especially useful for protecting against unauthorized access when the user is not physically present.
This type of authentication factor is based on the user's physical characteristics, such as their fingerprint, face, or voice. This type of authentication factor can be used to provide an additional layer of security and can be especially useful for protecting against unauthorized access when the user is not physically present.
Which of the following is NOT a type of MFA?
Somewhere you are is commonly referred to as a contextual access control but not an MFA type. This is because it's something that can typically be spoofed by an attacker. For example, if a geo-restriction is placed on a service so only people from Australia can login, an attacker can simply use a VPN to bypass this.
View Options Again
Somewhere you are.
Something you have.
Something you know.
Something you are.
Diving into the types of MFA
Not all MFA types and protocols are made equal. Over the next few pages we'll deep-dive into the various MFA types, the supported methods and discuss their strengths and weaknesses.
MFA best practices: Something you know
A password is commonly used to demonstrate something you know. A benefit to passwords is that they're widely accepted and easy to use. However, attackers can guess, crack, or steal passwords through social manipulation.
MFA best practices: Something you have
A One-Time-Password (OTP) is a common form of authentication for something you have. While it sounds simple, there are a variety of different forms for delivering these OTPs:
SMS-based OTP
Software-based OTP
Physical OTP
SMS-based OTPs are widely available and can be used with almost any mobile phone. However, some disadvantages include reliability and security, as SMS messages may be delayed and can potentially be intercepted by attackers through a SIM-swap attack. SMS OTPs are generally considered the weakest way of proving something you have.
Software-based OTPs are widely available, customisable and secure. However the downside is that it requires continued access to your phone or device. If you lose the device storing your token, you may have trouble gaining access to your accounts.
Physical OTPs involve a dedicated physical device, such as a security token or a key fob, as an additional authentication factor. An advantage of this method is that it's highly secure and durable. Physical OTPs are generally considered the most secure way of proving something you have.
MFA best practices: Something you are
Something you are typically refers to biometric authentication factors that use physical or behavioural characteristics of an individual to authenticate their identity.
Fingerprint
Facial recognition
Voice recognition
A fingerprint is a unique physical characteristic that can be used for authentication. Fingerprint authentication is generally considered to be the most accurate and secure. However, fingerprint authentication may not be suitable for individuals with medical conditions or disabilities that affect the fingerprint, and it may not be convenient.
Facial recognition uses AI to analyze the unique features of an individual's face to authenticate their identity. Facial recognition is generally considered to be fast and convenient. However, facial recognition may be less accurate and secure for individuals with certain physical characteristics, such as those who wear glasses or have facial hair.
Voice recognition uses AI to analyze and compare the unique characteristics of an individual's voice to authenticate their identity. Voice recognition is generally considered to be convenient and easy to use. However, it may be less accurate and secure for individuals with accents or speech impairments.
What is the most secure way of proving something you are?
While voice and facial recognition are useful methods of proving who you are, they are not the most secure as they are prone to inaccuracies, which may lead to an attacker spoofing your voice or face. A fingerprint is generally considered to be the most accurate and secure method. A password is something you know, not something you are.
View Options Again
Facial recognition.
Voice recognition.
Fingerprint.
Password.
What is the most secure way of proving something you have?
Physical One-Time-Passwords (OTPs) are generally considered the most secure way of proving something you have. This is because they require physical access of the token, protecting against many remote MFA-related cyber attacks.
View Options Again
SMS-based One-Time-Password.
Physical One-Time-Password.
Software-based One-Time-Password.
Mythological One-Time-Password.
Wrapping up
While there are a variety of different types of authentication and multiple methods within each, implementing at least two types will help to significantly reduce the likelihood of cyber criminals compromising your online accounts.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Multi-Factor-Authentication
[88, "Multi-Factor-Authentication", "Multi-Factor-Authentication"],
What is Multi-Factor Authentication (MFA)?
[89, "What is Multi-Factor Authentication (MFA)?", "What is Multi-Factor Authentication (MFA)?"],
MFA is a security process in which a user is required to provide two or more authentication factors in order to access a system or service.
[90, "MFA is a security process in which a user is required to provide two or more authentication factors in order to access a system or service.", "MFA is a security process in which a user is required to provide two or more authentication factors in order to access a system or service."],
What is MFA?
[91, "What is MFA?", "What is MFA?"],
A process that requires two or more factors of authentication in order to access a system.
[92, "A process that requires two or more factors of authentication in order to access a system.", "A process that requires two or more factors of authentication in order to access a system."],
A process that determines what level of permission you have once authenticated.
[93, "A process that determines what level of permission you have once authenticated.", "A process that determines what level of permission you have once authenticated."],
A process that requires a single authentication factor in order to access a system.
[94, "A process that requires a single authentication factor in order to access a system.", "A process that requires a single authentication factor in order to access a system."],
A technology that infects your computer with malicious software.
[95, "A technology that infects your computer with malicious software.", "A technology that infects your computer with malicious software."],
Multi-factor authentication (MFA) is a security process in which a user is required to provide two or more authentication factors in order to access a system or service.
[96, "Multi-factor authentication (MFA) is a security process in which a user is required to provide two or more authentication factors in order to access a system or service.", "Multi-factor authentication (MFA) is a security process in which a user is required to provide two or more authentication factors in order to access a system or service."],
MFA makes it more difficult for cyber criminals to gain access to systems.
[97, "MFA makes it more difficult for cyber criminals to gain access to systems.", "MFA makes it more difficult for cyber criminals to gain access to systems."],
MFA enforces multiple forms of authentication. Because of this, cyber criminals can't log in to services you use, even if they guess or obtain your password through other means. They need to capture the secondary form of authentication, which is typically something you have or something you are.
[98, "MFA enforces multiple forms of authentication. Because of this, cyber criminals can't log in to services you use, even if they guess or obtain your password through other means. They need to capture the secondary form of authentication, which is typically something you have or something you are.", "MFA enforces multiple forms of authentication. Because of this, cyber criminals can't log in to services you use, even if they guess or obtain your password through other means. They need to capture the secondary form of authentication, which is typically something you have or something you are."],
Types of MFA
[99, "Types of MFA", "Types of MFA"],
There are several types of MFA, these types can be broadly classified into three categories:
[100, "There are several types of MFA, these types can be broadly classified into three categories:", "There are several types of MFA, these types can be broadly classified into three categories:"],
Something you know
[101, "Something you know", "Something you know"],
This type of authentication factor requires the user to provide something that only they know, such as a password or a PIN. This is the most common type of authentication factor and is often used as the first layer of protection.
[102, "This type of authentication factor requires the user to provide something that only they know, such as a password or a PIN. This is the most common type of authentication factor and is often used as the first layer of protection.", "This type of authentication factor requires the user to provide something that only they know, such as a password or a PIN. This is the most common type of authentication factor and is often used as the first layer of protection."],
Something you have
[103, "Something you have", "Something you have"],
This type of authentication factor requires the user to have possession of something, such as a security token or a smartphone. This type of authentication factor can be used to provide an additional layer of security and can be especially useful for protecting against unauthorized access when the user is not physically present.
[104, "This type of authentication factor requires the user to have possession of something, such as a security token or a smartphone. This type of authentication factor can be used to provide an additional layer of security and can be especially useful for protecting against unauthorized access when the user is not physically present.", "This type of authentication factor requires the user to have possession of something, such as a security token or a smartphone. This type of authentication factor can be used to provide an additional layer of security and can be especially useful for protecting against unauthorized access when the user is not physically present."],
Something you are
[105, "Something you are", "Something you are"],
This type of authentication factor is based on the user's physical characteristics, such as their fingerprint, face, or voice. This type of authentication factor can be used to provide an additional layer of security and can be especially useful for protecting against unauthorized access when the user is not physically present.
[106, "This type of authentication factor is based on the user's physical characteristics, such as their fingerprint, face, or voice. This type of authentication factor can be used to provide an additional layer of security and can be especially useful for protecting against unauthorized access when the user is not physically present.", "This type of authentication factor is based on the user's physical characteristics, such as their fingerprint, face, or voice. This type of authentication factor can be used to provide an additional layer of security and can be especially useful for protecting against unauthorized access when the user is not physically present."],
Which of the following is NOT a type of MFA?
[107, "Which of the following is NOT a type of MFA?", "Which of the following is NOT a type of MFA?"],
Something you know.
[108, "Something you know.", "Something you know."],
Something you are.
[109, "Something you are.", "Something you are."],
Something you have.
[110, "Something you have.", "Something you have."],
Somewhere you are.
[111, "Somewhere you are.", "Somewhere you are."],
Somewhere you are is commonly referred to as a contextual access control but not an MFA type. This is because it's something that can typically be spoofed by an attacker. For example, if a geo-restriction is placed on a service so only people from Australia can login, an attacker can simply use a VPN to bypass this.
[112, "Somewhere you are is commonly referred to as a contextual access control but not an MFA type. This is because it's something that can typically be spoofed by an attacker. For example, if a geo-restriction is placed on a service so only people from Australia can login, an attacker can simply use a VPN to bypass this.", "Somewhere you are is commonly referred to as a contextual access control but not an MFA type. This is because it's something that can typically be spoofed by an attacker. For example, if a geo-restriction is placed on a service so only people from Australia can login, an attacker can simply use a VPN to bypass this."],
Diving into the types of MFA
[113, "Diving into the types of MFA", "Diving into the types of MFA"],
Not all MFA types and protocols are made equal. Over the next few pages we'll deep-dive into the various MFA types, the supported methods and discuss their strengths and weaknesses.
[114, "Not all MFA types and protocols are made equal. Over the next few pages we'll deep-dive into the various MFA types, the supported methods and discuss their strengths and weaknesses.", "Not all MFA types and protocols are made equal. Over the next few pages we'll deep-dive into the various MFA types, the supported methods and discuss their strengths and weaknesses."],
MFA best practices: Something you know
[115, "MFA best practices: Something you know", "MFA best practices: Something you know"],
A password is commonly used to demonstrate something you know. A benefit to passwords is that they're widely accepted and easy to use. However, attackers can guess, crack, or steal passwords through social manipulation.
[116, "A password is commonly used to demonstrate something you know. A benefit to passwords is that they're widely accepted and easy to use. However, attackers can guess, crack, or steal passwords through social manipulation.", "A password is commonly used to demonstrate something you know. A benefit to passwords is that they're widely accepted and easy to use. However, attackers can guess, crack, or steal passwords through social manipulation."],
MFA best practices: Something you have
[117, "MFA best practices: Something you have", "MFA best practices: Something you have"],
A One-Time-Password (OTP) is a common form of authentication for something you have. While it sounds simple, there are a variety of different forms for delivering these OTPs:
[118, "A One-Time-Password (OTP) is a common form of authentication for something you have. While it sounds simple, there are a variety of different forms for delivering these OTPs:", "A One-Time-Password (OTP) is a common form of authentication for something you have. While it sounds simple, there are a variety of different forms for delivering these OTPs:"],
SMS-based OTP
[119, "SMS-based OTP", "SMS-based OTP"],
SMS-based OTPs are widely available and can be used with almost any mobile phone. However, some disadvantages include reliability and security, as SMS messages may be delayed and can potentially be intercepted by attackers through a SIM-swap attack. SMS OTPs are generally considered the weakest way of proving something you have.
[120, "SMS-based OTPs are widely available and can be used with almost any mobile phone. However, some disadvantages include reliability and security, as SMS messages may be delayed and can potentially be intercepted by attackers through a SIM-swap attack. SMS OTPs are generally considered the weakest way of proving something you have.", "SMS-based OTPs are widely available and can be used with almost any mobile phone. However, some disadvantages include reliability and security, as SMS messages may be delayed and can potentially be intercepted by attackers through a SIM-swap attack. SMS OTPs are generally considered the weakest way of proving something you have."],
Software-based OTP
[121, "Software-based OTP", "Software-based OTP"],
Software-based OTPs are widely available, customisable and secure. However the downside is that it requires continued access to your phone or device. If you lose the device storing your token, you may have trouble gaining access to your accounts.
[122, "Software-based OTPs are widely available, customisable and secure. However the downside is that it requires continued access to your phone or device. If you lose the device storing your token, you may have trouble gaining access to your accounts.", "Software-based OTPs are widely available, customisable and secure. However the downside is that it requires continued access to your phone or device. If you lose the device storing your token, you may have trouble gaining access to your accounts."],
Physical OTP
[123, "Physical OTP", "Physical OTP"],
Physical OTPs involve a dedicated physical device, such as a security token or a key fob, as an additional authentication factor. An advantage of this method is that it's highly secure and durable. Physical OTPs are generally considered the most secure way of proving something you have.
[124, "Physical OTPs involve a dedicated physical device, such as a security token or a key fob, as an additional authentication factor. An advantage of this method is that it's highly secure and durable. Physical OTPs are generally considered the most secure way of proving something you have.", "Physical OTPs involve a dedicated physical device, such as a security token or a key fob, as an additional authentication factor. An advantage of this method is that it's highly secure and durable. Physical OTPs are generally considered the most secure way of proving something you have."],
MFA best practices: Something you are
[125, "MFA best practices: Something you are", "MFA best practices: Something you are"],
Something you are typically refers to biometric authentication factors that use physical or behavioural characteristics of an individual to authenticate their identity.
[126, "Something you are typically refers to biometric authentication factors that use physical or behavioural characteristics of an individual to authenticate their identity.", "Something you are typically refers to biometric authentication factors that use physical or behavioural characteristics of an individual to authenticate their identity."],
Fingerprint
[127, "Fingerprint", "Fingerprint"],
A fingerprint is a unique physical characteristic that can be used for authentication. Fingerprint authentication is generally considered to be the most accurate and secure. However, fingerprint authentication may not be suitable for individuals with medical conditions or disabilities that affect the fingerprint, and it may not be convenient.
[128, "A fingerprint is a unique physical characteristic that can be used for authentication. Fingerprint authentication is generally considered to be the most accurate and secure. However, fingerprint authentication may not be suitable for individuals with medical conditions or disabilities that affect the fingerprint, and it may not be convenient.", "A fingerprint is a unique physical characteristic that can be used for authentication. Fingerprint authentication is generally considered to be the most accurate and secure. However, fingerprint authentication may not be suitable for individuals with medical conditions or disabilities that affect the fingerprint, and it may not be convenient."],
Facial recognition
[129, "Facial recognition", "Facial recognition"],
Facial recognition uses AI to analyze the unique features of an individual's face to authenticate their identity. Facial recognition is generally considered to be fast and convenient. However, facial recognition may be less accurate and secure for individuals with certain physical characteristics, such as those who wear glasses or have facial hair.
[130, "Facial recognition uses AI to analyze the unique features of an individual's face to authenticate their identity. Facial recognition is generally considered to be fast and convenient. However, facial recognition may be less accurate and secure for individuals with certain physical characteristics, such as those who wear glasses or have facial hair.", "Facial recognition uses AI to analyze the unique features of an individual's face to authenticate their identity. Facial recognition is generally considered to be fast and convenient. However, facial recognition may be less accurate and secure for individuals with certain physical characteristics, such as those who wear glasses or have facial hair."],
Voice recognition
[131, "Voice recognition", "Voice recognition"],
Voice recognition uses AI to analyze and compare the unique characteristics of an individual's voice to authenticate their identity. Voice recognition is generally considered to be convenient and easy to use. However, it may be less accurate and secure for individuals with accents or speech impairments.
[132, "Voice recognition uses AI to analyze and compare the unique characteristics of an individual's voice to authenticate their identity. Voice recognition is generally considered to be convenient and easy to use. However, it may be less accurate and secure for individuals with accents or speech impairments.", "Voice recognition uses AI to analyze and compare the unique characteristics of an individual's voice to authenticate their identity. Voice recognition is generally considered to be convenient and easy to use. However, it may be less accurate and secure for individuals with accents or speech impairments."],
What is the most secure way of proving something you are?
[133, "What is the most secure way of proving something you are?", "What is the most secure way of proving something you are?"],
Fingerprint.
[134, "Fingerprint.", "Fingerprint."],
Facial recognition.
[135, "Facial recognition.", "Facial recognition."],
Voice recognition.
[136, "Voice recognition.", "Voice recognition."],
Password.
[137, "Password.", "Password."],
While voice and facial recognition are useful methods of proving who you are, they are not the most secure as they are prone to inaccuracies, which may lead to an attacker spoofing your voice or face. A fingerprint is generally considered to be the most accurate and secure method. A password is something you know, not something you are.
[138, "While voice and facial recognition are useful methods of proving who you are, they are not the most secure as they are prone to inaccuracies, which may lead to an attacker spoofing your voice or face. A fingerprint is generally considered to be the most accurate and secure method. A password is something you know, not something you are.", "While voice and facial recognition are useful methods of proving who you are, they are not the most secure as they are prone to inaccuracies, which may lead to an attacker spoofing your voice or face. A fingerprint is generally considered to be the most accurate and secure method. A password is something you know, not something you are."],
What is the most secure way of proving something you have?
[139, "What is the most secure way of proving something you have?", "What is the most secure way of proving something you have?"],
SMS-based One-Time-Password.
[140, "SMS-based One-Time-Password.", "SMS-based One-Time-Password."],
Software-based One-Time-Password.
[141, "Software-based One-Time-Password.", "Software-based One-Time-Password."],
Physical One-Time-Password.
[142, "Physical One-Time-Password.", "Physical One-Time-Password."],
Mythological One-Time-Password.
[143, "Mythological One-Time-Password.", "Mythological One-Time-Password."],
Physical One-Time-Passwords (OTPs) are generally considered the most secure way of proving something you have. This is because they require physical access of the token, protecting against many remote MFA-related cyber attacks.
[144, "Physical One-Time-Passwords (OTPs) are generally considered the most secure way of proving something you have. This is because they require physical access of the token, protecting against many remote MFA-related cyber attacks.", "Physical One-Time-Passwords (OTPs) are generally considered the most secure way of proving something you have. This is because they require physical access of the token, protecting against many remote MFA-related cyber attacks."],
Wrapping up
[145, "Wrapping up", "Wrapping up"],
While there are a variety of different types of authentication and multiple methods within each, implementing at least two types will help to significantly reduce the likelihood of cyber criminals compromising your online accounts.
[146, "While there are a variety of different types of authentication and multiple methods within each, implementing at least two types will help to significantly reduce the likelihood of cyber criminals compromising your online accounts.", "While there are a variety of different types of authentication and multiple methods within each, implementing at least two types will help to significantly reduce the likelihood of cyber criminals compromising your online accounts."],
[147, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.