Alternative to traditional password that are created by users.

              There are alternatives to passwords. Passwords are considered by many to be insecure and easy to break. So what are the alternative and how are they better?   For this discussion you will research alternative to traditional password that are created by users. Choose an article and summarize your chosen alternative method of authentication. Do you think it is a possible alternative? How difficult is it to implement and manage? Is special hardware needed to use it? Does it have its own weaknesses? These are some of the topics you should be thinking about when you write    
Although biometric authentication has some advantages over its password-based counterpart it does have its own set of weaknesses as well. For instance, depending on the specific implementation details required by an organization some special hardware may be needed such as fingerprint scanners or iris recognition cameras; additionally these devices may need regular maintenance/updates in order to remain operational during peak usage times. In conclusion, although biometrics is not immune to attacks like its password-based counterparts it does present a viable solution for organizations looking for improved security measures without having to resort completely away from more traditional methods of authentication. It should however be noted that due diligence must still be taken when considering any changes related specifically to access control policies within one’s environment before making any final decisions regarding which method best suits their particular needs.

Sample Solution

An increasingly popular alternative to passwords is biometric authentication, which uses unique physical characteristics such as fingerprints or iris scans to verify user identity. Unlike passwords, biometrics are difficult to hack due to the fact that they require a direct interaction between a person and the device in order for authentication to take place. Furthermore, since biometric features are unique per individual they cannot be shared with other people thus providing an additional layer of security. In addition, this form of authentication can also be used in combination with traditional passwords for extra protection if desired.