Research Article
Access to Network Login by Three-Factor Authentication for Effective Information Security
| Account category | Description/example | Damages by security threats or failure | Suggested password method |
| Business critical | Business emails with client data | Business, strategic and employee confidentiality; brand image, reputation | Extremely secure: 3-factor authentication | High risk | Financial like bank acct, online purchases, and personal email | Financial data exposure, monetary loss, and personal information exposure | Highly secure: 3-factor authentication | Low risk | Social networking and enquiry sites | Identity exposure | Moderate: 1 factor authentication |
|
|