Skip to main content
2FA (2-factor authentication) and MFA (multi-factor authentication)

2FA and MFA

CYBERSECURITY DICTIONARY

2FA (2-factor authentication) and MFA (multi-factor authentication)

2FA requires both knowledge (like a password) and something tangible (such as a hardware or software authentication system) to gain access to a protected computer system.

By some definitions, MFA takes that one step further by also requiring something that is unique to your physical being (like a fingerprint or retina or behavior) in order to authenticate an identity. However, the term MFA is often used when there are only two factors.  In traditional 2FA, the authentication device can be either hardware based (such as a token) or software based (such as a mobile app). The role of the authentication device is to generate a unique and temporary cryptographic code that must be input, in addition to a password, to gain access to a computer resource. Without the code, a hacker that has stolen a user's password will not be able to gain access to a protected system which makes 2FA a minimum security best practice.

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

August 30, 2013

Teaching Cybersecurity to the Next Generation

From airline security to nuclear plants, our world is made up of systems. Threats to these systems from hackers have raised concerns about privacy, pe...

See Details

March 06, 2018

Cybersecurity, Where Art Thou?

Infosecurity Magazine | March 6, 2018 Looking at the existential crisis of when, where, and how much to invest in cybersecurity.

See Details

September 07, 2017

Cybersecurity Executives Changes

SC Media | September 7, 2017 Venafi has named Ben Golub to its board of directors. Golub is currently the executive chairman and interim CEO at Storj...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.