The differences and benefits of two-factor and two-step authentication protocols