Research Article

Access to Network Login by Three-Factor Authentication for Effective Information Security

Table 1


Account categoryDescription/exampleDamages by security threats or failureSuggested password method

Business criticalBusiness emails with client dataBusiness, strategic and employee confidentiality; brand image, reputationExtremely secure:
3-factor authentication
High riskFinancial like bank acct, online purchases, and personal emailFinancial data exposure, monetary loss, and personal information exposureHighly secure: 3-factor authentication
Low riskSocial networking and enquiry sitesIdentity exposureModerate: 1 factor authentication