Token-Based Devices

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

What are Token-Based Devices?

A Token-based device or a security token is known by several names such as, hardware token, authentication token, USB token, cryptographic token, software token, virtual token, or key fob. A security token may be a physical device that an authorized user is given to access a system or network. Security tokens are used to prove one’s identity electronically and is used in addition to or in place of a password to prove that the customer is who they claim to be. The token acts like an electronic key to access something.

Back to T | Back to the Glossary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?