... the connection work properly, using the proper information, the user can not be authenticated.1 Information Security: The Big Picture - SANS GIAC © 2000 1 Information Security: The Big Picture ... a friend.There are some other, more advanced alternatives to passwords, and they will be covered in the next slide.19 Information Security: The Big Picture - SANS GIAC © 2000 19 The Challenge-Response ... with practices in other parts of the world, particularly in the US. The US approach to privacy is markedly different from the EU. In the US, citizens have an expectation of privacy in many circumstances...