0% found this document useful (0 votes)
133 views

2fa PPT

sophisticated ppt on two factor authentication

Uploaded by

Karishma Solanki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views

2fa PPT

sophisticated ppt on two factor authentication

Uploaded by

Karishma Solanki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

TWO FACTOR

AUTHENTICATI
ON METHOD
CONTENTS OF
THIS
What is two factor
PRESENTATION
authentication?
What is the need for
it.
How does it work?
Types of two factor
authentication
How to implement 2fa
What is Two factor Authentication?
TWO FACTOR AUTHENTICATION IS
ALSO KNOWN AS
TWO STEP VERIFICATION DUAL
FACTOR
IT VERIFICATION
IS A SPECIAL TYPE OF MULTI FACTOR
SECURITY PROCESS2FAIN WHICH USERS
PROVIDE TWO DIFFERENT
AUTHENTICATION FACTORS TO VERIFY
THEMSELVES TO ACCESS A SYSTEM,
NETWORK OR APPLICATION

THIS ADDS AN ADDITIONAL LAYER OF


SECURITY TO THE TRADITIONAL
USERNAME AND PASSWORD COMBINATION
MAKING IT MORE DIFFICULT FOR
NEED FOR TWO STEP
Need for 2FA arises
from limitations of
VERIFICATION Protects against
threats, like Stolen
traditional password Passwords Brute Force
based authentication 0 0
Attacks, MITM
systems, which are 1 3 attacks ,Key Logging,
vulnerable to various Phishing Attempts
attacks,
Users can feel more
2FA is crucial for
confident that their
ensuring that only
accounts are secure,
authorized individuals
knowing that their 0 0 can access sensitive
account remains
2 4 data like personal data,
protected by an
financial records, or
additional layer of
intellectual property
security.
How Does
It Work?
Two-Factor Authentication (2FA)
works by requiring two different
forms of verification before granting
access to an account or system.
Typically, it involves:
Something You Know: The user first
enters their password or PIN.
Something You Have: The user then
provides a second form of
verification, such as a code sent to
their mobile device, an
TYPES OF TWO FACTOR AUTHENTICATION
UNIQUE SUCH
A ONE TIME CODE SENT TO AS A ONE TIME
CODE OR LINK IS AUTHENTICATOR FINGERPRINTS, CODE OR LINK IS
SENT TO THE APPS LIKE DUO FACIAL SENT TO THE
USER VIA SMS MOBILE RECOGNITION ,I USER VIA EMAIL
RIS SCANS

01 02 03 04
SMS APP BASED BIOMETRIC EMAIL
BASED BASED
AUTHENTIC AUTHENTIC AUTHENTIC AUTHENTIC
ATION ATION ATION ATION
TYPES OF TWO FACTOR AUTHENTICATION
SET OF 8 DIGIT
BANKING A SMALL A POPUP
CODES
AUTOMATED PHYSICAL SCREEN WITH
PROVIDED TO
SERVICE ASKING DEVICE USED TO SET OF CODES
USERS AS 2ND
TO SAY NAME VERIFY IDENTITY FOR E.G:
SECURITY
OR PRESS A KEY LIKE KEY FOB GOOGLE SIGNUP
FACTOR

05 06 07 08
VOICE
BASED PUSH
HARDWARE BACKUP
AUTHENTIC NOTIFICATI
ATION TOKEN CODES ON
BENEFITS OF TWO FACTOR
AUTHENTICATION
PREVENTS PROTECTS
ENHANCED UNAUTHORIZ SENSITIVE
SECURITY ED ACCESS DATA
Adds an extra layer of Requires a second Secures confidential
protection beyond factor to verify and critical
passwords BOOSTS
identity information
MINIMIZE USER COST
PHISHING CONFIDENC EFFECTIVE
IMPACT E SECURITY
Safeguards against Provides peace of Offers significant
phishing attacks mind with stronger protection at a
account protection. relatively low cost.
THANKS!
FOR
CO-
OPERATI
ON A PRESENTATION BY
~KAVYA KUNDAR
~KARISHMA
SOLANKI

You might also like