Article Type
Article
Abstract
With the rapid increase in cybersecurity threats targeting network systems, traditional two-factor authentication (2FA) methods are insufficient to address advanced attacks. Vulnerabilities such as phishing, SIM-swapping, and social engineering exploit the limitations of SMS-based and email-based 2FA. This paper examines advanced strategies and solutions for securing networked environments through robust 2FA mechanisms, focusing on approaches like elliptic curve cryptography (ECC), digital certificates, and biometric verification. This article offers a comparative review of various strategies about their effectiveness in enhancing security, while also highlighting their capacity to optimize user-friendliness and adaptability to emerging threats. Research findings promote an effective countermeasure strategy for network security, highlighting lessons and best practices in the implementation of advanced two-factor authentication solutions within a multi-network framework.
Keywords
Two-factor authentication (2FA), Network security, Elliptic curve cryptography (ECC), Biometric authentication, Digital certificates, Cybersecurity, Behavioral authentication, Phishing, SIM-swapping
Recommended Citation
Jawad, Zahraa Sameer
(2025)
"Advanced Strategies and Solutions Towards More Secure and Effective Two-Factor Authentication in Networking,"
Al-Esraa University College Journal for Engineering Sciences: Vol. 7:
Iss.
11, Article 13.
DOI: https://doi.org/10.70080/2790-7732.1068
Included in
Biomedical Engineering and Bioengineering Commons, Chemical Engineering Commons, Civil and Environmental Engineering Commons, Computer Engineering Commons, Materials Science and Engineering Commons, Mechanical Engineering Commons