Abstract
This session will explore various authentication technologies such as passwords, tokens, and biometrics. Additional topics include the growing use of SSL and the threat models that arise depending on how the initial authentication is performed, as well as failure and remediation modes of some of the most popular authentication systems.