Strong authentication: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (2 intermediate revisions by the same user not shown) | |||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (2 intermediate revisions by the same user not shown) | |||
(No difference)
| |||
A method used to secure computer systems and/or networks by verifying a user’s identity by requiring two-factors in order to authenticate (something you know, something you are, or something you have).
Source: CNSSI 4009-2015 | Category: