Across
- 2. Login method requiring two or more verification steps
- 3. One‑time passcode generated using a counter
- 4. Fraudulent attempt to steal sensitive information by pretending to be a trusted source
Down
- 1. Login method using fingerprint or facial recognition
