A method used to secure computer systems and/or networks by verifying a user’s identity by requiring two-factors in order to authenticate (something you know, something you are, or something you have).
Source(s):
CNSSI 4009-2015
from
DoDI 8420.01