Previous Page  30 / 54 Next Page
Information
Show Menu
Previous Page 30 / 54 Next Page
Page Background

Two Factor Authentication (2FA)

UAEU Information Security Mission Statement

2FA (Two-Factor) Goals

What is 2FA?

Why should I use 2FA?

How 2FA Authentication helps

2FA Strategy at UAEU

How 2FA method works?

Why 2FA is so important?

Design, implement and maintain an information security program that protects the University’s resources against unauthorized use, modification and loss. Establish a practical

information security program that enables UAEU to be the best public research University in the world.

Two-Factor authentication enhances the security of UAEU

user credentials by using a secondary method to verify

user identity when the user is trying to access UAEU

applications. This service will provide enhanced security

and protect the user in case someone manages to obtain

user login credentials.

According to researchers, higher education institutions

are increasingly becoming a target for cyber criminals.

Two-factor authentication decrease the chances of a

security attack because the hacker cannot access data

with user login credentials alone.

2FA authentication prevents attackers from accessing

your account, even if they obtain your username and

password.

Second Factor: SMS Logon – A 6-digits OTP (One-Time

Password) will be sent to your registered mobile number

as SMS and personal email address as E-Mail.

Credentials are commonly stolen through:

After valid username and password combination, a

verification code; the second authentication factor, is

needed to gain the access successfully.

»

»

Legitimate user authentication

»

»

No fraudulent logins

»

»

Ensures secure access

»

»

Protects malicious activities

»

»

Adds an extra layer of security

»

»

Double checks the users’ identity

»

»

2FA stand for Two Factor Authentication.

»

»

Also known as Two Step Verification.

»

»

It is more than just password-alone verification.

»

»

An additional security layer.

»

»

Phishing attacks

»

»

User compromised

»

»

Capture data using key-loggers

»

»

eServices Application

»

»

eLearning Application

»

»

UAEU Portal

»

»

Library Resources

»

»

Remote Access Services

28

Jun 24, 2018
Oct 17, 2022