Two-factor authentication (2FA) comparison of methods and applications

Authors

  • Izabela Szczygieł Rzeszow University of Technology, Department of Complex Systems, Poland Author
  • Sebastian Florczak University of Information Technology and Management Author
  • Adrian Jasiak University of Information Technology and Management Author

DOI:

https://doi.org/10.5281/zenodo.10050024

Abstract

In this document, the investigation delves into the realm of two-factor authentication (2FA), exploring its applications and comparing various methods of implementation. Two-factor authentication, often referred to colloquially as two-step verification, serves to enhance credential security during login processes across platforms such as Facebook and online banking, among others. While 2FA has significantly improved the security of the login and registration processes, it is noteworthy that its adoption tends to be more prevalent among younger individuals. Unfortunately, an increasing number of financial scams target older individuals who may be disinclined to engage with what they perceive as the complexity of multi-step authentication and password confirmation. Subsequent chapters provide a discussion of the various types of two-factor authentication, furnish detailed descriptions, and offer a summary of the benefits and gains achievable through the deployment of 2FA.

Downloads

Published

2023-10-13

How to Cite

Izabela Szczygieł, Sebastian Florczak, & Adrian Jasiak. (2023). Two-factor authentication (2FA) comparison of methods and applications. Advances in Web Development Journal, 1(1). https://doi.org/10.5281/zenodo.10050024