Most common technique is user ID / password
Authorization – Is user permitted to access?
Access control list – users with rights to access
Authentication – Is user who they claim to be?
Smart card – computer-readable plastic card with embedded security information
Biometric devices – keystroke patterns, fingerprinting, retinal scans, voice characteristics