DISCUSSION DUE: Authentication Models – Applied Authentication Control
ASSIGNMENT: Do some research on various authentication models . . . aside from the password, what are other ways we authenticate ourselves?
You should create an annotated bibliography for one academic journal describing a model of authentication. Please post at least 250 words providing your perspective on the authentication model. Is it usable? Could it replace passwords? Why or why not?
Be sure to respond to at least two of your classmate's posts. Responses should be in APA format and at least one reference.