Problem
a) Explain the different types of access controls and the roles they play in a "defense in-depth" strategy.
b) What are the pros and cons of three different biometric identification authentication systems?
c) What security controls would you use to make credit cards more secure?
d) What is authentication, and what are three different ways to accomplish it?
e) Provide links for further reading.