“…Authentication is responsible for verifying that a person is really who he/she claims, and authorization is about assigning appropriate privileges to the person after the verification of his/her identity. There are 3 types of authentications [10, p 209]: (i) something the user knows, for example, password and PIN (personal identity number), (ii) something the user has, for example, physical keys, access cards, and smart cards etc., and (iii) something the user is -so called biometric authentication, such as voice recognition [14], fingerprints matching, and iris scanning etc. Password authentication is simple, accurate, and effective and will continue to be the working horse of information security.…”