With decades of career experience serving the broadcasting and telecommunications industries across Michigan and the Midwest, Scott Westerman is now an author, podcaster, lecturer, and blogger living in Jacksonville, Florida. Scott Westerman knows about business computer applications and enjoys learning about software design and cybersecurity.
Besides the password, which is a “knowledge” factor (something the user knows), there are several additional authentication factors users can choose from as a backup. The “possession” factor, for example, is related to something the user has, such as a smartphone, through which the user can receive a short-term passcode.
A “biometric” factor is something inherent to the user’s physical self, such as fingerprints or facial and voice recognition. There is also the “location” factor, which limits authentication attempts to only specific areas and devices predetermined by the user. Lastly, the “time” factor only allows user authentication within a particular time window.