Authentication methods and their flaws
Reusable Passwords
Easily obtained—viewed, sniffed, or guessed
Encrypted Passwords (Kerberos)
Require lots of client/server cooperation
One-time passwords
You must carry something with you
Previous slide
Next slide
Back to first slide
View graphic version