Content deleted Content added
HD password scanning is not a failing - it's what you have, not what you know that provides extra security. |
reference Bruce |
||
Line 9:
A common example of T-FA is a bank card ([[credit card]], [[debit card]]); the card itself is the physical item, and the personal identification number (PIN) is the data that goes with it. See [[Chip and PIN]] for more information on this.
According to proponents, T-FA could drastically reduce the incidence of online identity theft, and other online [[fraud]], because the victim's password would no longer be enough to give a thief access to their information. However, [[Bruce Schneier]] argues T-FA is still vulnerable to trojan and man-in-the-middle attacks{{ref|Bruce}}.
== Examples ==
Line 66:
5) Multiple footnotes to the same reference will not work: you must insert two uniquely named footnotes.
NOTE: It is important to add the Footnote in the right order in the list. -->
# {{note|TechTarget}} [http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss426_art864,00.html Token Effort], ''"USB tokens aren't as strong as you think."'' (TechTarget, Jul 2004)
==External links==
Line 73 ⟶ 75:
* [http://www.rsasecurity.com/node.asp?id=1156 RSA SecurID]
* [http://www.securecomputing.com/ SecureComputing]
▲* [http://www.schneier.com/blog/archives/2005/03/the_failure_of.html The Failure of Two-Factor Authentication (Bruce Schneier, March 2005)]
* [http://www.vnunet.com/news/1161914 Microsoft to abandon passwords], Microsoft preparing to dump passwords in favour of two-factor authentication in forthcoming versions of Windows (vnunet.com, 14 Mar 2005)
|