5. Sources

Authentication (last accessed January 8, 2022): https://www.techtarget.com/searchsecurity/definition/authentication

Identification and Authentication Failures (last accessed January 9, 2022): https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/

What Is Certificate-Based Authentication and Why Should I Use It? (last accessed on January 8, 2022): https://www.globalsign.com/en/blog/what-is-certificate-based-authentication

5 Authentication Methods that Can Prevent the Next Breach (last accessed January 9, 2022): https://www.idrnd.ai/5-authentication-methods-that-can-prevent-the-next-breach/

The Ultimate Authentication Playbook (last accessed January 9, 2022): https://www.okta.com/blog/2019/02/the-ultimate-authentication-playbook/

Web Authentication Methods Compared (last accessed January 9, 2022): https://testdriven.io/blog/web-authentication-methods/

Authentication for web applications (last accessed January 9, 2022): http://web.science.mq.edu.au/~mattr/courses/web_applications/9_Authentication/notes.html

Different ways to Authenticate a Web Application (last accessed January 9, 2022): https://medium.com/@vivekmadurai/different-ways-to-authenticate-a-web-application-e8f3875c254a

Information Security - Authentication and Access Control (last accessed on December 28, 2021): https://www.edx.org/course/information-security-authentication-and-access-control