The most commonly employed scheme is "something you
know." Typically, the something you know that authenticates your identity is a
password, code, or sequence. The security is predicated on the idea that if you know
the secret password or code then you must be who you claim to be and be authorized
to access the network. Even though this scheme is the most widely implemented, it is
not very secure. It is easy to circumvent or compromise.