Content deleted Content added
m →Mobile phone two-factor authentication: changed exlink to reference because that's how it was used |
removed some unnecessary tags |
||
Line 1:
{{refimprove|date=June 2015}}
{{NAMESPACE:Two-factor authentication}}
{{Computer security}}
'''Two-factor authentication''' (also known as '''2FA''') is a method of confirming a user's claimed identity by utilizing a combination of two different components. These components may be something that the user knows, something that the user possesses or something that is inseparable from the user.<ref>{{Cite web|url=http://www.iphonebackupextractor.com/blog/2016/jun/3/extract-data-two-factor-authentication/|title=How to extract data from an iCloud account with two-factor authentication activated|website=iphonebackupextractor.com|access-date=2016-06-08}}</ref> A good example from everyday life is the withdrawing of money from a cash machine. Only the correct combination of a [[bank card]] (something that the user possesses) and a PIN (personal identification number, something that the user knows) allows the transaction to be carried out. 2FA is ineffective against modern threats,<ref>{{cite web|url=https://www.schneier.com/blog/archives/2012/02/the_failure_of_2.html|title=The Failure of Two-Factor Authentication - Schneier on Security|author=|date=|work=schneier.com|accessdate=23 October 2015}}</ref> like ATM skimming, phishing, and malware etc.
== Components ==
|