« Back to Glossary Index
A security process that protects against unauthorized access by requiring users to provide two or more distinct authentication factors to gain access to a system
« Back to Glossary IndexThink you can outsmart AI? Announcing ‘Behind The Mask’ – Our all-new cybercrime role-playing game | Play Now
A security process that protects against unauthorized access by requiring users to provide two or more distinct authentication factors to gain access to a system
« Back to Glossary Index