Return to Article Details Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication Download Download PDF