beanz Magazine


Kate Russell on Flickr

This odd acronym offers security protection beyond your password. Here are a few examples of how 2FA works.

Experts compare computer security to a chain. Every link in the chain needs to be strong: good encryption, good network protocols, good passwords. An attacker only needs to break one link for the whole chain to go down. Naturally, they’ll go after the weakest link.

Turns out the weakest link in computer security is usually humans. Specifically, our passwords.

After all, who has time to remember 67 different passwords, each 25 characters long, each a jolly jumble of numbers and letters? No one, that’s who. Either we walk around with giant lists of passwords or we cut corners. We reuse passwords; we keep to the minimum length; we choose passwords that are easy to remember… like ‘password123’.

And since people aren’t a fan of getting hacked, companies came up with a novel idea to make up for the fact that our passwords are terrible: a second authentication factor!

‘Authentication Factor’ is just a fancy of way of saying ‘something that proves your identity’. In real life we have passports, health cards, and driver’s licenses. Online, we have passwords. With 2FA (2-factor authentication), instead of providing one piece of online ID, you provide two. That way, if one password is compromised, the other stands strong and unbroken.

Wait, a second password? Isn’t that worse?


Become a subscriber and get access to the rest of this article. Plus all our magazine articles.

Stories also include numerous links to help parents, kids, and teachers learn more. Get access today at just $15 per year!

Subscribe Today!

Also In The February 2017 Issue

This cryptography method is based on the fact some tasks are relatively easy to do, but extremely difficult to undo.

There's a way to find out if your online passwords have been stolen, and how to prevent it.

Racket is a fun and easy programming language to learn because it's all about creating colors and shapes as you learn.

Networks are a mostly hidden but critical part of the internet.

Surveillance cameras, satellites, RFID tags, and social media activities all create unique digital footprints.

Developers deal with common problems in their work. Here’s are a few problems and how to overcome them.

Programmers use libraries but instead of books they create and share code, often for free, to help solve common problems.

These cards are a fun way to learn Scratch, look up how to do things, and make applications.

Another mysterious four-letter acronym that helps secure information online.

Dorothy Vaughn, Mary Jackson, and Katherine Johnson not only helped make history, they are part of a long line of women in computing

It's almost time to think about summer tech camps if your kids are interested. Here are a few questions to ask.

Your web browser knows (and tells) a lot more about you than you might realize.

When you pick a programming language to learn first, it helps to figure out what software you want to create.

This odd acronym offers security protection beyond your password. Here are a few examples of how 2FA works.

Links from the bottom of all the February 2017 articles, collected in one place for you to print, share, or bookmark.

Interesting stories about computer science, software programming, and technology for February 2017.