Infographic Description:
Level 1: Simple password challenge-response protocols. (emails / social media)
Level 2: Secure authentication that claimant controls "token." (education / payroll)
Level 3: At least two authentication factors required. (banking / insurance / healthcare)
Level 4: Proof of possession of a key through a crypto protocol. (personal identity verification / bionics)