Cybersecurity Day - MFA Booth

12345678910
Across
  1. 1. Practice of requiring two or more independent factors.
  2. 3. Time-based one-time password algorithm.
  3. 6. State value that advances to produce the next HOTP code.
  4. 8. Hardware security key used for HOTP+PIN and FIDO flows.
  5. 9. Counter-based HMAC one-time password algorithm.
  6. 10. USB class used for human-interface devices; referenced in your “named HID” TOTP context.
Down
  1. 2. The application that generates TOTP and is protected with FIDO.
  2. 4. Local secret on a security key used alongside HOTP validation.
  3. 5. Browser-facing W3C standard that implements FIDO authenticators.
  4. 7. Open authentication standards enabling phishing-resistant, passwordless login used in your implementation.