Login

Please fill in your details to login.





017: the double lock: implementing two-factor authentication (ks4)

A KS4 Computer Science cover lesson on Two-Factor Authentication (2FA). Students adopt The Digital Protector persona to explore, evaluate, and implement robust 2FA security protocols.

The Double Lock: Fortifying Digital Defences


In the modern digital landscape, relying solely on a password is the equivalent of locking a bank vault with a rusty padlock. Cybercriminals have developed highly sophisticated automated tools capable of guessing millions of passwords per second (brute force attacks) or cross-referencing breached databases to see if you have reused the same password across multiple sites (credential stuffing). To counter this, cybersecurity professionals, acting as Digital Protectors, implement Two-Factor Authentication (2FA).

2FA is a security process in which users provide two different authentication factors to verify themselves. This concept operates on the principle that even if a hacker steals a password, they will still be blocked from accessing the account without the second factor.

Security experts categorize authentication into three distinct types of factors:

Knowledge (Something you know): This is information stored in your brain, such as a password, a PIN, or answers to security questions.
Possession (Something you have): This requires a physical object in your control. Examples include a smartphone, a bank card, or a dedicated hardware security token (like a YubiKey).
Inherence (Something you are): This involves biometric verification based on unique physical characteristics, such as a fingerprint scan, facial recognition, or an iris scan.

A true 2FA system requires factors from two different categories. For example, entering a password (Knowledge) and then typing a code sent to your smartphone (Possession).

While sending a One-Time Password (OTP) via SMS text message is a common form of 2FA, it is increasingly viewed as vulnerable. Hackers can execute a "SIM swap" attack, convincing a mobile carrier to transfer the victim's phone number to a criminal's SIM card, intercepting the security codes. Consequently, the industry standard is shifting towards Authenticator Apps, which generate time-based codes locally on the device itself, making them significantly harder to intercept.

Comprehension Questions


Answer the following questions on lined paper. Ensure you write the date, title, and your name at the top. You may stop when the questions become too difficult.

1
What does the acronym 2FA stand for?
2
Name two types of attacks hackers use to crack passwords mentioned in the text.
3
What are the three main categories of authentication factors?
4
Give one example of an "Inherence" factor.
5
If a system asks for a password and then a memorable word, why is this NOT considered true Two-Factor Authentication based on the categories provided?
6
Explain the concept of 2FA using an analogy of a physical building or safe.
7
What does OTP stand for?
8
Briefly explain how a "SIM swap" attack compromises an SMS-based 2FA system.
9
Why are Authenticator Apps considered a more secure method of "Possession" than receiving SMS text messages?
10
Evaluate the statement: "Biometric authentication is flawless and should completely replace passwords." Provide at least one reason why a cybersecurity professional might disagree with this statement.

Plugged-In Task


image
The Scenario

You have been hired as a lead security consultant for "Apex Global Finance," a multinational banking firm. Last month, cybercriminals bypassed standard password security and compromised several high-profile customer accounts using credential stuffing attacks. The board of directors has demanded an immediate upgrade to the login architecture. Your job is to research, design, and justify a new Two-Factor Authentication (2FA)I have no idea what this means system to prevent future breaches.

The Persona

Today, you are operating as The Digital Protector. Your mindset must be focused purely on digital security and safety. You must think like an attacker to build impenetrable defences, balancing the need for rigorous security with user accessibility.

Your Mission


You are required to produce a formal "Authentication Upgrade Report" for the board of directors. Use your word processor to create this document. Follow the steps below to gather your intelligence and construct your report.

1
Establish the Baseline Knowledge

1
Open a new document and create a title page for your "Authentication Upgrade Report".
2
Create a heading called "The Vulnerability of Passwords".
3
Research why single-factor authentication is no longer sufficient. You can use this secure search link to find information: Why are passwords vulnerable?
4
Write a brief paragraph explaining how hackers use techniques like brute force and dictionary attacks to compromise single-factor accounts.

2
Define the Defensive Strategy

1
Create a new heading called "The Mechanics of 2FA".
2
You need to explain the three main categories of authentication factors: Knowledge, Possession, and Inherence.
3
Use the following AI Prompt to get a clear, exam-focused explanation. Read the output and summarise it in your own words.

Act as a supportive, expert cybersecurity tutor. Explain the three factors of authentication: Knowledge, Possession, and Inherence. Maximum of 150 words. Explain this so a 15-year-old KS4 student can understand. Keep the tone professional, clear, and focused on exam-level knowledge. Limit your response to 3 short bullet points. Provide 1 real-world analogy. Do not write my essay for me. NO intro, NO outro, NO deviation from the topic, NO follow-up questions.


3
Evaluate Implementation Methods

1
Create a heading called "Evaluating 2FA Methods".
2
Not all 2FA is created equal. Research the difference between SMS text message codes and Authenticator Apps (like Google Authenticator or Authy). Use this link: SMS vs Authenticator Apps.
3
Write a comparison explaining why cybersecurity professionals consider Authenticator Apps to be much more secure than SMS text messages (hint: look up "SIM swapping").

4
Final Recommendations

1
Create your final heading: "Recommendations for Apex Global Finance".
2
Write a final, persuasive paragraph advising the board of directors on exactly which two factors they should implement for their customers, and justify why this combination provides the best balance of high security and user convenience.

Outcome
Before you submit your file, ensure your report contains:
A clear explanation of password vulnerabilities.
Definitions of Knowledge, Possession, and Inherence factors.
A technical comparison between SMS and Authenticator App 2FA methods.
A final, justified recommendation suitable for a corporate board.
Professional, exam-appropriate vocabulary throughout.

Unplugged Task


As The Digital Protector, you know that if security is too difficult to use, people will try to bypass it.
Your task is to draw a wireframe (a visual blueprint) for a new mobile banking app's login sequence that uses Two-Factor Authentication.

Screen 1: The initial login screen.
Screen 2: The 2FA prompt screen.
Screen 3: The successful login dashboard.

Constraint: You must clearly annotate your drawing to explain exactly which two factors (Knowledge, Possession, or Inherence) the user is interacting with on each screen, and add notes on how you have made the interface clear and easy to understand for an average user.

Last modified: March 6th, 2026
The Computing Café works best in landscape mode.
Rotate your device.
Dismiss Warning