Added lines about how an SSH server can be configured to utilize a second factor authentication method to augment authentication security and how if one's password is compromised, an attacker must compromise this second (or third) factor of authentication too, to gain access.