Two Factor Authentication
Two Factor Authentication
By WILL KENTON
Updated Sep 28, 2020
What Is Two-Factor Authentication (2FA)?
Two-factor authentication (2FA) is a security system that requires two distinct forms of
identification in order to access something.
KEY TAKEAWAYS
Two-factor authentication (2FA) is a security system that requires two separate, distinct
forms of identification in order to access something.
The first factor is a password and the second commonly includes a text with a code
sent to your smartphone, or biometrics using your fingerprint, face, or retina.
While 2FA does improve security, it is not foolproof.
Understanding Two-Factor Authentication (2FA)
Two-factor authentication is designed to prevent unauthorized users from gaining access to
an account with nothing more than a stolen password. Users may be at greater risk of
compromised passwords than they realize, particularly if they use the same password on
more than one website. Downloading software and clicking on links in emails can also expose
an individual to password theft.1 2
2FA is not just applied to online contexts. It is also at work when a consumer is required to
enter their zip code before using their credit card at a gas pump or when a user is required to
enter an authentication code from an RSA SecurID key fob to log in remotely to an employer’s
system.2
Despite the slight inconvenience of a longer log-in process, security experts recommend
enabling 2FA wherever possible: email accounts, password managers, social media
applications, cloud storage services, financial services, and more.
Special Considerations
While 2FA does improve security, it is not foolproof. Hackers who acquire the authentication
factors can still gain unauthorized access to accounts. Common ways to do so
include phishing attacks, account recovery procedures, and malware.
Hackers can also intercept text messages used in 2FA. Critics argue that text messages are
not a true form of 2FA since they are not something the user already has but rather
something the user is sent, and the sending process is vulnerable. Instead, the critics argue
that this process should be called two-step verification. Some companies, such as Google,
use this term.3
Still, even two-step verification is more secure than password protection alone. Even stronger
is multi-factor authentication, which requires more than two factors before account access will
be granted.4
What is 2FA?
Two-factor authentication (2FA) is a specific type of multi-factor authentication (MFA) that strengthens access
security by requiring two methods (also referred to as authentication factors) to verify your identity. These
factors can include something you know - like a username and password - plus something you have - like a
smartphone app - to approve authentication requests.
2FA protects against phishing, social engineering and password brute-force attacks and secures your logins
from attackers exploiting weak or stolen credentials.
Let’s say you use a username and password to complete primary authentication to an application. That
information is sent over the Internet (your primary network). You’ll want to use a different (out-of-band)
channel to complete your second factor. Approving a push notification sent over your mobile network is an
example of out-of-band authentication.
So why does it matter? If a remote attacker is able to tap into your computer via your Internet connection, they
can steal your password, and your second form of authentication — if both are delivered over the same channel.
Without your physical device, remote attackers can’t pretend to be you in order to gain unauthorized access to
corporate networks, cloud storage, financial information, etc. stored in applications.
By integrating two-factor authentication with your applications, attackers are unable to access your
accounts without possessing your physical device needed to complete the second factor.