Authentication is the process of verifying that a user is really who he or she claims to be. The most common type of authentication is a user logging into a computer system with a user ID and a password, which is an example of a single factor authentication. Two factors authentication is used to enhance the security in authentication. It requires two types of information to perform the authentication process. Typically, this involves a password and a second factor such as a private key, a smart card or a biometric factor (e.g. iris or fingerprint), etc. |
Authentication is the process of verifying that a user is really who he or she claims to be. The most common type of authentication is a user logging into a computer system with a user ID and a password, which is an example of a single factor authentication. Two factors authentication is used to enhance the security in authentication. It requires two types of information to perform the authentication process. Typically, this involves a password and a second factor such as a private key, a smart card or a biometric factor (e.g. iris or fingerprint), etc. |
Level:
Duration:
Authentication is the process of verifying that a user is really who he or she claims to be. The most common type of authentication is a user logging into a computer system with a user ID and a password, which is an example of a single factor authentication. Two factors authentication is used to enhance the security in authentication. It requires two types of information to perform the authentication process. Typically, this involves a password and a second factor such as a private key, a smart card or a biometric factor (e.g. iris or fingerprint), etc. |
Level:
Duration:
Resources
Essential Information
- Teachers
- Students
- Knowledge Base - Laws and Legislation
- IT Security - Antivirus Software
- IT Security - Cookies
- IT Security - Encryption
- IT Security - Filtering Software
- IT Security - Firewall
- IT Security - POP3
- IT Security - Public Key Infrastructure (PKI)
- IT Security - Secure Sockets Layer
- IT Security - Two Factors Authentication
- IT Security - Wireless connection
- Parents

Lesson Plans
- 01 - 'What and Why' in the use of Internet
- 02 - Overview of CESY
- 03 - Networking Basics
- 04 - Crime Rating
- 05 - Intellectual Property Rights
- 06 - Net-community
- 07 - Reliability of information and trustworthiness of humankind on the Internet
- 08 - Overuse of the Internet
- 09 - Advancement of technology
- 10 - Promotion of Cyber Ethics in school context and at home

Alternative Approach