Introduction to Authentication - Identifying Security Vulnerabilities