multifactor authentication
- multifactor authentication
"An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature."
مصادقة متعددة العوامل
English-Arabic terms dictionary.
2015.
Look at other dictionaries:
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Multi-factor authentication — Multi factor authentication, sometimes called strong authentication, is an extension of two factor authentication. This is the Defense in depth approach of Security In Layers applied to authentication. While two factor authentication only… … Wikipedia
One-time password — A one time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs … Wikipedia
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
Security token — Several types of security tokens with a penny for scale … Wikipedia
Software token — A software token is a type of two factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general purpose electronic device such as a desktop computer, laptop, PDA, or… … Wikipedia
Layered security — is a new term used by information protection and online security vendors that describes the practice of leveraging several different point security solutions to protect the digital identities and information of consumer, enterprise or government… … Wikipedia
Weak key — In cryptography, a weak key is a key which when used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually represent a very small fraction of the overall keyspace, which usually means that if one generates a… … Wikipedia
Online banking — Part of a series on Electronic commerce Online goods and services Streaming media Electronic books Softwar … Wikipedia
Opportunistic encryption — (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel otherwise falling back to unencrypted communications. This method requires no pre arrangement between the two systems. Opportunistic … Wikipedia
Check Point Abra — Check Point GO is a USB drive that combines an encrypted USB flash drive with virtualization, VPN and computer security technologies to turn a PC into a secure corporate desktop. By plugging Check Point GO into the USB port of a Microsoft… … Wikipedia