##plugins.themes.bootstrap3.article.main##

Adnan Mazhar Alam

Tushar Ghorpade

Ekta Sarda

Abstract

Authentication System was unveiled by the efficient computer scientist Ronald Rivest; this was the biggest achievement in the security since the advent of 2FA. Altogether, this innovation developed a strong barrier in the realm of digital security and contributed to the struggle against cyber threats. Two-Factor Authentication (2FA) also known as the two-step verification has therefore evolved as one of the most important security practices for securing access for mobile users. Coupled with threats that are felt online this particular kind of authentication system has a critical role in protecting desirable information from being accessed by unauthorized persons. Since 2FA is a security system that respondents use traditional passwords, KBA, possession-based components such as SMS or OTP, and even complex biometric verifications, it is a strong barrier against hackers and any other unauthorized individuals. Based on the aforementioned points, it would be appropriate to conclude that it is right to claim that the major advantage of implementing 2FA is in attaining a significantly higher level of security than is provided by SHA methods. This added extra layer of security greatly enhances the task of the unauthorized groups to breach the multiple layers of security therefore making 2FA as the gold standard of security in the contemporary society of personal and business protection.

##plugins.themes.bootstrap3.article.details##