Identity management | Information Systems homework help

Verifying the identity of users is an important component of access management, and thus overall information security management. There are  several different methods that are commonly used to address identity verification for systems. The most common is the ubiquitous username and password pair. 
Do you feel that this type of identity verification is sufficient? Do you feel that other identity verification systems (like biometric identification systems) will grow in popularity and use in the future? 


"Are you looking for this answer? We can Help click Order Now"