Skip to Main Content
Network Security First-Step, Second Edition
book

Network Security First-Step, Second Edition

by Thomas M. Thomas, Donald Stoddard
December 2011
Beginner content levelBeginner
552 pages
13h 30m
English
Cisco Press
Content preview from Network Security First-Step, Second Edition

Two-Factor Authentication/Multifactor Authentication

As we have shown when reviewing RADIUS and TACACS, they are a means to securely authenticate to access a secure device. Those authentication methods relied on the user knowing a secret codeword or password, typically things the user knows. Although they are efficient, they are single layers in the defense of your network; additional layers, for defense in depth, are provided by using two-factor authentication. Two-factor authentication is when there are two independent and separate methods of authentication that the user must pass to gain access. Usually one of the two methods is something the user has that must be applied as part of the authentication process. You might think that this is ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Security Auditing

Network Security Auditing

Chris Jackson - CCIE No. 6256
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke

Publisher Resources

ISBN: 9781587204142Purchase book