Problem
Your enterprise security director has recently mandated two-factor authentication for your critical network systems. Describe in detail all the factors of authentication and how you would implement a two-factor system. What factors would you choose? Provide examples of actual product solutions and their configurations to support your chosen factors. What do you think about the privacy (personal intrusiveness) implications of some authentication factors?