Summary: A detailed description of the three types of authentication security. What are they and when are they used?