![]() ![]() It isn’t much better when the organization changes passwords every month. Then, the attacker can impersonate the user for an unlimited time. When the attacker gets the password of the user, he can use it within its lifetime. The strongest authentication uses all of them and is called three-factor authentication. ![]() ![]() Single-factor authentication takes place when only one of the mentioned above things is taken into account while authenticating the user. ![]()
0 Comments
Leave a Reply. |