Research Article

Access to Network Login by Three-Factor Authentication for Effective Information Security

Table 2


AdvantagesDisadvantages

Information securityTime consuming
Secured login: secures websites, portals, and web applicationsSpace complexity
Depth in defense: three levels of protectionRemembering ability
Trust ability towards the service provider by the users System configuration