Research Article
Access to Network Login by Three-Factor Authentication for Effective Information Security
| Advantages | Disadvantages |
| Information security | Time consuming | Secured login: secures websites, portals, and web applications | Space complexity | Depth in defense: three levels of protection | Remembering ability | Trust ability towards the service provider by the users | System configuration |
|
|