Problem definition

The usage of second factor is commonplace in high-security-risk environments, like netbanking, interactions with the government, etc. 

The common scenario is to use desktop or a large-screen tablet to access a web interface of the service which, after providing the first factor (usually username and password), asks for a second factor provided by a different device, usually a mobile phone. 

This method yields security benefits as it circumvents several problems around passwords: weak passwords, stolen passwords, and keyloggers on a compromised operating system, in the sense that even though they are able to log the passwords they cannot avoid the second factor that is almost always challenge-based.

MFA methods


Second factor options for mobile phones


  • No labels