From the course: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep (2024)

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Something you have

Something you have

- In the last video, you learned how organizations achieve multifactor authentication by combining authentication approaches from two different categories. The most common approach is to combine something you know, such as a password or PIN, with something you have, such as a physical token. Let's talk about ways that you can implement authentication based upon something the user has in his or her possession. Traditionally, organizations implemented something-you-have authentication using physical tokens, like this one. They're small hardware devices that the user typically carries on a key chain. When the need to authenticate arises, the user first provides a username and password, satisfying the something-you-know criteria. The system then prompts the user to provide an authentication code. The user pulls out his or her token and presses the button. The token then displays a code that the user enters into the system, proving physical possession of the token and completing the…

Contents