This is kind of a boring article, but it has a decent graphic showing the two-step authentication process. Also, includes a brief summary of different attacks and compromises of Apple and other organizations that has prompted the industry to adopted the “two-step authentication”process.
Check it out at the link bellow:
Apple adds two-step verification option for Apple IDs | Apple – CNET News.