http://www.sans.org/rr/whitepapers/authentication/122.php

Quote:
One of our highest priorities in the world of information security is confirmation that a person is accessing sensitive, confidential, or classified information is authorized to do so. Such access is usually accomplished by a person�s proving their identity by the use of some means or method of authentication. Simply put, a person must be able to validate why they say they are before accessing information, and if the person is unable to do so, access will be denied, Generally speaking, a system can identify you as an authorized user in one of three ways � what you know, what you have, or what you are.
This document serves as an introduction to biometric identification and its uses. It explains both the positives and negatives to each form of biometrics, and analyzes possible applications of this technology. (PDF format)


"We can categorically state that we have not released man-eating badgers into the area."

-UK military spokesman Major Mike Shearer