From 4c4b247e339e92afc38927d482c5dbf2f92d01ccb2dda651bff2846813f38df7 Mon Sep 17 00:00:00 2001 From: Nicholas Johnson Date: Thu, 10 Aug 2023 00:00:00 +0000 Subject: Correct term --- content/entry/comparing-multi-factor-authentication-methods.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/entry/comparing-multi-factor-authentication-methods.md b/content/entry/comparing-multi-factor-authentication-methods.md index 868188b..22d163b 100644 --- a/content/entry/comparing-multi-factor-authentication-methods.md +++ b/content/entry/comparing-multi-factor-authentication-methods.md @@ -8,7 +8,7 @@ I made a nice little chart comparing [multi-factor authentication](https://www.w ## Multi-Factor Authentication Chart ```chart comparing multi-factor authentication methods +----------------+----------------+-----------------+-------------+--------------+----------------+-------------+-------------------+ -| Authentication | AI-Based | Biometric | Email Token | Hardware | Security | Text Codes | Time-Based | +| Authentication | Risk-Based | Biometric | Email Token | Hardware | Security | Text Codes | Time-Based | | Methods | | | | Security Key | Questions | | One-Time Password | +----------------+----------------+-----------------+-------------+--------------+----------------+-------------+-------------------+ | Security | strong | strong | fair | strong | weak | weak | strong | -- cgit v1.2.3