In Lecture 5 we discussed access control. Part of that discussion was on techniques used to authenticate a claim of identity (e.g. passwords, tokens, biometrics). In this portion of the assignment you will research and report on a specific access technology.
"Is this question part of your assignment? We Can Help!"
