Two-factor authentication has been available to technology consumers for a long time, and a few years ago businesses and institutions began implementing optional two-factor authentication to improve digital security. Now more universities and hospitals are moving from optional to mandatory two-factor authentication, and employees used to two-factor authentication for their personal digital life must adjust to using two-factor authentication in their work flow. This column will review some of the ongoing and emergent aspects of two-factor authentication to enhance security in an ever-changing digital landscape.

Download full-text PDF

Source
http://dx.doi.org/10.1080/02763869.2018.1514912DOI Listing

Publication Analysis

Top Keywords

two-factor authentication
28
mandatory two-factor
8
authentication
7
two-factor
6
review two-factor
4
authentication suggested
4
suggested security
4
security effort
4
effort moves
4
moves mandatory
4

Similar Publications

The Internet of Things technology allows you to transfer data to any asset through communication networks such as the Internet or intranet. One of the most important problems is security, which includes confidentiality, authenticity validation, and completeness. Among security problems, the most important ones are ensuring authenticity and protecting privacy.

View Article and Find Full Text PDF

Two-factor authentication underpins the precision of the piRNA pathway.

Nature

October 2024

Centre for Regenerative Medicine, Institute for Regeneration and Repair, Institute for Stem Cell Research, University of Edinburgh, Edinburgh, UK.

The PIWI-interacting RNA (piRNA) pathway guides the DNA methylation of young, active transposons during germline development in male mice. piRNAs tether the PIWI protein MIWI2 (PIWIL4) to the nascent transposon transcript, resulting in DNA methylation through SPOCD1 (refs. ).

View Article and Find Full Text PDF

A Blockchain-Based Authentication Mechanism for Enhanced Security.

Sensors (Basel)

September 2024

School of Computing, Engineering and Physical Sciences, University of the West of Scotland, Lanarkshire G72 0LH, UK.

Passwords are the first line of defence against preventing unauthorised access to systems and potential leakage of sensitive data. However, the traditional reliance on username and password combinations is not enough protection and has prompted the implementation of technologies such as two-factor authentication (2FA). While 2FA enhances security by adding a layer of verification, these techniques are not impervious to threats.

View Article and Find Full Text PDF

A Self-Oscillated Organic Synapse for In-Memory Two-Factor Authentication.

Adv Sci (Weinh)

June 2024

Department of Micro/Nano Electronics, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China.

Entering the era of AI 2.0, bio-inspired target recognition facilitates life. However, target recognition may suffer from some risks when the target is hijacked.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!