Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are.
A Trojan is also known as Trojan horse. It is a type of malicious software developed by hackers to disguise as legitimate software to gain access to target users systems.
A threat is a possible danger that might exploit a vulnerability to violate security protocols and thus, cause possible harm.
Tailgating involves someone who lacks the proper authentication following an employee into a restricted area.
A tablet is a wireless, portable personal computer with a touchscreen interface.