Two Factor Authentication (2FA)
UAEU Information Security Mission Statement
2FA (Two-Factor) Goals
What is 2FA?
Why should I use 2FA?
How 2FA Authentication helps
2FA Strategy at UAEU
How 2FA method works?
Why 2FA is so important?
Design, implement and maintain an information security program that protects the University’s resources against unauthorized use, modification and loss. Establish a practical
information security program that enables UAEU to be the best public research University in the world.
Two-Factor authentication enhances the security of UAEU
user credentials by using a secondary method to verify
user identity when the user is trying to access UAEU
applications. This service will provide enhanced security
and protect the user in case someone manages to obtain
user login credentials.
According to researchers, higher education institutions
are increasingly becoming a target for cyber criminals.
Two-factor authentication decrease the chances of a
security attack because the hacker cannot access data
with user login credentials alone.
2FA authentication prevents attackers from accessing
your account, even if they obtain your username and
password.
Second Factor: SMS Logon – A 6-digits OTP (One-Time
Password) will be sent to your registered mobile number
as SMS and personal email address as E-Mail.
Credentials are commonly stolen through:
After valid username and password combination, a
verification code; the second authentication factor, is
needed to gain the access successfully.
»
»
Legitimate user authentication
»
»
No fraudulent logins
»
»
Ensures secure access
»
»
Protects malicious activities
»
»
Adds an extra layer of security
»
»
Double checks the users’ identity
»
»
2FA stand for Two Factor Authentication.
»
»
Also known as Two Step Verification.
»
»
It is more than just password-alone verification.
»
»
An additional security layer.
»
»
Phishing attacks
»
»
User compromised
»
»
Capture data using key-loggers
»
»
eServices Application
»
»
eLearning Application
»
»
UAEU Portal
»
»
Library Resources
»
»
Remote Access Services
28