This document discusses identification and authentication methods. It begins by defining identification as announcing who you are, while authentication proves that you are who you claim to be. Passwords are a common authentication method, but they can be guessed or stolen. The document then examines alternative authentication approaches, including something you know (like a password or PIN), something you hold (like a smart card), who you are (biometrics like fingerprints), what you do (handwriting analysis), and where you are (only allowing logins from approved locations). Biometrics are discussed in depth, including related concepts like false acceptance rates, equal error rates, and issues from real-world incidents. The document evaluates different identification and authentication techniques and their strengths