1. Two-factor authentication is a more secure method of verifying or validating your
identity.
Authentication is an important aspect of computer security. In order for your PC, or an
application, or a web site to determine whether or not you are authorized access it must
first be able to determine who you are. There are three basic ways to establish your
identity with authentication:
1. what you know
2. what you have
3. who you are
The most common method of authentication is the username and password. This may
seem like two factors, but both the username and the password are 'what you know'
components and the username is generally public knowledge or easily guessed. So, the
password is the only thing standing between an attacker and impersonating you.
Two-factor authentication requires using two different methods, or factors, to provide an
additional layer of protection. Typically, two-factor authentication involves using either
'what you have' or 'who you are' in addition to the standard username and password
('what you know'). Below are some quick examples:
What you have. This method usually relies on a smartcard, USB thumbdrive, or
some other type of object which the user must have in order to authenticate.
Smartcards and USB drives must be physically inserted into the computer in order to
authenticate. There are also encryption tokens which display randomly changing pin
codes that the user must enter in order to authenticate. In either event, an attacker
would have to know your password ('what you know'), and also be in physical
possession of your token or smartcard ('what you have') in order to authenticate as
you.
Who you are. Who you are is difficult to impersonate. A rudimentary form of 'who you
are' authentication is a photo ID. Providing an official ID which can be verified as
being yours by virtue of your photo being on it meets both 'what you have' and 'who
you are' criteria. However, a photo ID isn't very functional when dealing with computer
access. Biometrics are a common form of 'who you are' authentication. Many
characteristics are unique to each individual such as fingerprints, retina patterns,
handwriting style, voice pattern, etc. An attacker may be able to guess or crack your
password, but impersonating your fingerprint or retina pattern is virtually impossible.
2. Facebook's two-factor authentication (a.k.a Login Approvals) is an added security
feature used to help prevent hackers from logging into your account with a stolen
password. It helps you prove to Facebook that you are who you say you are. This
is done by Facebook determining that you are connecting from a previously
unknown device or browser and issuing you an authentication challenge,
requiring you to enter a numeric code that generated by using the Code
Generator tool from within your smartphone's Facebook app.
Once you have entered the code you received on your phone, Facebook will
allow the login to take place. Hackers (whom hopefully don't have your
smartphone) will not be able to authenticate since they won't have access to the
code (unless they have your phone).
How to Enable Facebook Two-Factor Authentication (Login Approvals)
Enabling Login Approvals From Your Desktop Computer:
1. Log on to Facebook. Click on the Padlock near the top right corner of the
browser window and click “More Settings”.
2. Click on “Security Settings” on the left side of the screen.
3. Under the security settings menu, click the “Edit” link next to “Login
Approvals”.
4. Click the check box next to “Require a security code to access my account
from unknown browsers”. A pop-up menu will appear.
5. Click the “Get Started” button at the bottom of the pop-up window.
6. Enter a name for the browser you are using when prompted (i.e. “Home
Firefox”). Click “Continue”.
7. Select the type of phone you have and click “Continue”.
8. Open the Facebook app on your iPhone or Android phone.
Ads
Top SIP Investment plans
www.myuniverse.co.in/ZipSip
Compare & invest in best Funds. 0 paper work. Start today.
The Red Flag Group
www.redflaggroup.com
We help you manage your integrity and compliance risks.
9. Tap the menu icon in the top left corner.
10. Scroll down and select the “Code Generator” link and choose "activate".
Once the code generator is active you will see a new code on the screen every
30 seconds. This code will act as a security token and will be requested
3. whenever you try to log in from a browser that you haven't used before (after you
enable login approvals).
11. On your desktop computer, click "Continue" after completing the code
generator activation process.
12. Enter your Facebook password when prompted and click the "Submit" button.
13. Choose your Country Code, enter your cell phone number, and click
"Submit". You should receive a text with a code number that you will need to
enter when prompted on Facebook.
14. After you receive confirmation that the Login Approval Setup is complete,
close the pop-up window.
After Login approvals have been enabled, the next time you attempt to access
Facebook from an unknown browser, you will be asked for a code from the
Facebook Code Generator that you setup earlier.
Enabling Login Verification From Your Smartphone (iPhone or Android):
You can enable Facebook Login Approvals from your Smartphone by following a
similar process on your phone:
1. Open the Facebook app on your smartphone.
2. Tap the menu icon in the top left corner of the screen.
3. Scroll down and choose “Account Settings”.
4. Tap the “Security” menu.
5. Tap on “Login Approvals” and follow the instructions (should be similar to the
process mentioned above).