|| Authentication Type
|| Description of Security Level
||Can be guessed by fraudsters. Susceptible to brute force attacks.
||OTP over SMS
||Verifies that you have your mobile device but susceptible to Man-In-The-Middle attacks.
||Verifies that you have your Hardware Token but susceptible to Man-In-The-Middle attacks.
||Verifies who you are but susceptible to Man-In-The-Middle attacks.
||NO Man-In-The-Middle attacks are possible because verification happens through a separate channel but spoofing is easy by creating a duplicate SIM or acquiring the credentials related to Push Notifications.
||NO Man-In-The-Middle attacks are possible and Spoofing is much more difficult.
||Verifies who you are and what you have.
||Verifies what you know and what you have.
||Verifies what you know and who you are.
||Verifies what you know, who you are and what you have.
||Risk Based Access
||Verifies what you have, where you are, what time you are accessing the resources that you need and is your behavior different from what you have done in the past.