It is the start of most access controls. You claim that you are a unique identity.
Examples: Username, swiping a smartcard, fingerprint scanner, face scanner, etc.
A subjects identity is usually considered public information. IT systems only track your unique ID.
Is used to verify that you are indeed the unique identity you are claiming. Most commonly used authentication is a password.
Authentication information is private information and needs to be protected.
The user (subject) authenticates himself and the system (object) authenticates and authorizes him.
Risks associated with passwords:
Password often are and need to be stored as a hash. When a user authenticates their typed in password gets hashed as well and will then be compared.
You need many different letters, capitalized and uncapitalized, numbers and characters. It also has to be sufficiently long.
What not to use: