3) Hardware Authentication
Login credentials are woefully inadequate for offer security. They can help to manage system access, but the reality is that they fall short of the mark in almost every way. Most significantly, passwords rely on users to be secure. That is simply not something you can expect in a realistic situation.