SlideShare a Scribd company logo
1 of 3
Two-factor authentication is a more secure method of verifying or validating your
identity.
Authentication is an important aspect of computer security. In order for your PC, or an
application, or a web site to determine whether or not you are authorized access it must
first be able to determine who you are. There are three basic ways to establish your
identity with authentication:
1. what you know
2. what you have
3. who you are
The most common method of authentication is the username and password. This may
seem like two factors, but both the username and the password are 'what you know'
components and the username is generally public knowledge or easily guessed. So, the
password is the only thing standing between an attacker and impersonating you.
Two-factor authentication requires using two different methods, or factors, to provide an
additional layer of protection. Typically, two-factor authentication involves using either
'what you have' or 'who you are' in addition to the standard username and password
('what you know'). Below are some quick examples:
 What you have. This method usually relies on a smartcard, USB thumbdrive, or
some other type of object which the user must have in order to authenticate.
Smartcards and USB drives must be physically inserted into the computer in order to
authenticate. There are also encryption tokens which display randomly changing pin
codes that the user must enter in order to authenticate. In either event, an attacker
would have to know your password ('what you know'), and also be in physical
possession of your token or smartcard ('what you have') in order to authenticate as
you.
 Who you are. Who you are is difficult to impersonate. A rudimentary form of 'who you
are' authentication is a photo ID. Providing an official ID which can be verified as
being yours by virtue of your photo being on it meets both 'what you have' and 'who
you are' criteria. However, a photo ID isn't very functional when dealing with computer
access. Biometrics are a common form of 'who you are' authentication. Many
characteristics are unique to each individual such as fingerprints, retina patterns,
handwriting style, voice pattern, etc. An attacker may be able to guess or crack your
password, but impersonating your fingerprint or retina pattern is virtually impossible.
 Facebook's two-factor authentication (a.k.a Login Approvals) is an added security
feature used to help prevent hackers from logging into your account with a stolen
password. It helps you prove to Facebook that you are who you say you are. This
is done by Facebook determining that you are connecting from a previously
unknown device or browser and issuing you an authentication challenge,
requiring you to enter a numeric code that generated by using the Code
Generator tool from within your smartphone's Facebook app.
 Once you have entered the code you received on your phone, Facebook will
allow the login to take place. Hackers (whom hopefully don't have your
smartphone) will not be able to authenticate since they won't have access to the
code (unless they have your phone).
 How to Enable Facebook Two-Factor Authentication (Login Approvals)
 Enabling Login Approvals From Your Desktop Computer:
 1. Log on to Facebook. Click on the Padlock near the top right corner of the
browser window and click “More Settings”.
 2. Click on “Security Settings” on the left side of the screen.
 3. Under the security settings menu, click the “Edit” link next to “Login
Approvals”.
 4. Click the check box next to “Require a security code to access my account
from unknown browsers”. A pop-up menu will appear.
 5. Click the “Get Started” button at the bottom of the pop-up window.
 6. Enter a name for the browser you are using when prompted (i.e. “Home
Firefox”). Click “Continue”.
 7. Select the type of phone you have and click “Continue”.
 8. Open the Facebook app on your iPhone or Android phone.
 Ads
 Top SIP Investment plans
 www.myuniverse.co.in/ZipSip
 Compare & invest in best Funds. 0 paper work. Start today.
 The Red Flag Group
 www.redflaggroup.com
 We help you manage your integrity and compliance risks.
 9. Tap the menu icon in the top left corner.
 10. Scroll down and select the “Code Generator” link and choose "activate".
Once the code generator is active you will see a new code on the screen every
30 seconds. This code will act as a security token and will be requested
whenever you try to log in from a browser that you haven't used before (after you
enable login approvals).
 11. On your desktop computer, click "Continue" after completing the code
generator activation process.
 12. Enter your Facebook password when prompted and click the "Submit" button.
 13. Choose your Country Code, enter your cell phone number, and click
"Submit". You should receive a text with a code number that you will need to
enter when prompted on Facebook.
 14. After you receive confirmation that the Login Approval Setup is complete,
close the pop-up window.
 After Login approvals have been enabled, the next time you attempt to access
Facebook from an unknown browser, you will be asked for a code from the
Facebook Code Generator that you setup earlier.
 Enabling Login Verification From Your Smartphone (iPhone or Android):
 You can enable Facebook Login Approvals from your Smartphone by following a
similar process on your phone:
 1. Open the Facebook app on your smartphone.
 2. Tap the menu icon in the top left corner of the screen.
 3. Scroll down and choose “Account Settings”.
 4. Tap the “Security” menu.
 5. Tap on “Login Approvals” and follow the instructions (should be similar to the
process mentioned above).

More Related Content

What's hot

Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
tamfin
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
Guneet Pahwa
 

What's hot (20)

Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Findin...
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Zsun
ZsunZsun
Zsun
 
Phishing
PhishingPhishing
Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
A07010105
A07010105A07010105
A07010105
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
INSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPSINSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPS
 
Web spoofing (1)
Web spoofing (1)Web spoofing (1)
Web spoofing (1)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Viewers also liked (7)

How To Sell Without Selling
How To Sell Without Selling How To Sell Without Selling
How To Sell Without Selling
 
What is the Most Scalable Solution?
What is the Most Scalable Solution?What is the Most Scalable Solution?
What is the Most Scalable Solution?
 
Arrow VMware NSX Infographic
Arrow VMware NSX Infographic Arrow VMware NSX Infographic
Arrow VMware NSX Infographic
 
SAB
SABSAB
SAB
 
Imran_Resume
Imran_ResumeImran_Resume
Imran_Resume
 
PowerAndPerformance
PowerAndPerformancePowerAndPerformance
PowerAndPerformance
 
Hp vertica certification guide
Hp vertica certification guideHp vertica certification guide
Hp vertica certification guide
 

Similar to Two

Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
HaroldCo
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
Hai Nguyen
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
Hai Nguyen
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 

Similar to Two (20)

Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
How to trust applications downloaded online.pdf
How to trust applications downloaded online.pdfHow to trust applications downloaded online.pdf
How to trust applications downloaded online.pdf
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
Evolution of MFA.pptx
Evolution of MFA.pptxEvolution of MFA.pptx
Evolution of MFA.pptx
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Spyware
SpywareSpyware
Spyware
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 

Two

  • 1. Two-factor authentication is a more secure method of verifying or validating your identity. Authentication is an important aspect of computer security. In order for your PC, or an application, or a web site to determine whether or not you are authorized access it must first be able to determine who you are. There are three basic ways to establish your identity with authentication: 1. what you know 2. what you have 3. who you are The most common method of authentication is the username and password. This may seem like two factors, but both the username and the password are 'what you know' components and the username is generally public knowledge or easily guessed. So, the password is the only thing standing between an attacker and impersonating you. Two-factor authentication requires using two different methods, or factors, to provide an additional layer of protection. Typically, two-factor authentication involves using either 'what you have' or 'who you are' in addition to the standard username and password ('what you know'). Below are some quick examples:  What you have. This method usually relies on a smartcard, USB thumbdrive, or some other type of object which the user must have in order to authenticate. Smartcards and USB drives must be physically inserted into the computer in order to authenticate. There are also encryption tokens which display randomly changing pin codes that the user must enter in order to authenticate. In either event, an attacker would have to know your password ('what you know'), and also be in physical possession of your token or smartcard ('what you have') in order to authenticate as you.  Who you are. Who you are is difficult to impersonate. A rudimentary form of 'who you are' authentication is a photo ID. Providing an official ID which can be verified as being yours by virtue of your photo being on it meets both 'what you have' and 'who you are' criteria. However, a photo ID isn't very functional when dealing with computer access. Biometrics are a common form of 'who you are' authentication. Many characteristics are unique to each individual such as fingerprints, retina patterns, handwriting style, voice pattern, etc. An attacker may be able to guess or crack your password, but impersonating your fingerprint or retina pattern is virtually impossible.
  • 2.  Facebook's two-factor authentication (a.k.a Login Approvals) is an added security feature used to help prevent hackers from logging into your account with a stolen password. It helps you prove to Facebook that you are who you say you are. This is done by Facebook determining that you are connecting from a previously unknown device or browser and issuing you an authentication challenge, requiring you to enter a numeric code that generated by using the Code Generator tool from within your smartphone's Facebook app.  Once you have entered the code you received on your phone, Facebook will allow the login to take place. Hackers (whom hopefully don't have your smartphone) will not be able to authenticate since they won't have access to the code (unless they have your phone).  How to Enable Facebook Two-Factor Authentication (Login Approvals)  Enabling Login Approvals From Your Desktop Computer:  1. Log on to Facebook. Click on the Padlock near the top right corner of the browser window and click “More Settings”.  2. Click on “Security Settings” on the left side of the screen.  3. Under the security settings menu, click the “Edit” link next to “Login Approvals”.  4. Click the check box next to “Require a security code to access my account from unknown browsers”. A pop-up menu will appear.  5. Click the “Get Started” button at the bottom of the pop-up window.  6. Enter a name for the browser you are using when prompted (i.e. “Home Firefox”). Click “Continue”.  7. Select the type of phone you have and click “Continue”.  8. Open the Facebook app on your iPhone or Android phone.  Ads  Top SIP Investment plans  www.myuniverse.co.in/ZipSip  Compare & invest in best Funds. 0 paper work. Start today.  The Red Flag Group  www.redflaggroup.com  We help you manage your integrity and compliance risks.  9. Tap the menu icon in the top left corner.  10. Scroll down and select the “Code Generator” link and choose "activate". Once the code generator is active you will see a new code on the screen every 30 seconds. This code will act as a security token and will be requested
  • 3. whenever you try to log in from a browser that you haven't used before (after you enable login approvals).  11. On your desktop computer, click "Continue" after completing the code generator activation process.  12. Enter your Facebook password when prompted and click the "Submit" button.  13. Choose your Country Code, enter your cell phone number, and click "Submit". You should receive a text with a code number that you will need to enter when prompted on Facebook.  14. After you receive confirmation that the Login Approval Setup is complete, close the pop-up window.  After Login approvals have been enabled, the next time you attempt to access Facebook from an unknown browser, you will be asked for a code from the Facebook Code Generator that you setup earlier.  Enabling Login Verification From Your Smartphone (iPhone or Android):  You can enable Facebook Login Approvals from your Smartphone by following a similar process on your phone:  1. Open the Facebook app on your smartphone.  2. Tap the menu icon in the top left corner of the screen.  3. Scroll down and choose “Account Settings”.  4. Tap the “Security” menu.  5. Tap on “Login Approvals” and follow the instructions (should be similar to the process mentioned above).