Authentication Methods
Personal Chars (something you are)
Fingerprint and voice; retinal scan
Hardware Tokens (something you have)
Includes SecurID and smart cards
The biggest disadvantage is cost
Previous slide
Next slide
Back to first slide
View graphic version