Often, strong authentication is associated with two-factor authentication or more generally multi-factor authentication.
Identification and authentication (I&A) is the process of verifying that an identity is bound to the entity that makes an assertion or claim of identity.
The I&A process assumes that there was an initial validation of the identity, commonly called identity proofing.
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity.
If your daily activity requires loging in a lot of Linux systems through SSH, you will be happy to know (if you don't already) that there's a way to allow secure, authenticated remote access, file transfer, and command execution without having to remember passwords for each individual host you connect.
How to Use RSA Key for SSH Authentication
The YubiKey - the key to the cloud
Secure your mission-critical data with RSA SecurID
jfggkkwygf iueyrgdjstevx mfklldooe