Finding the balance between these factors, in addition
to implementing authentication correctly in the first
place, is very difficult. Many authors of computer
systems lack the expertise or the time necessary to do
this, so they may deliver authentication
implementations in their products that are not secure