Verifies that whoever is trying to access the data is the person you want accessing the data. e.g. User + Password

Methods: * Username + password * Biometrics * 2FA

Multifactor Authentication#

Two-factor Authentication Generally uses methods in the following categories: * Something you know * Something you have * Something you are * Somewhere you are * Something you do * Some when you are