After users are authenticated, what measures can be employed in order to maintain security when users are away from their computers?
2. Discuss ways in which the use of strong authentication can be designed to be "user friendly" without compromising its effectiveness.