These are used to allow access to the correct user into the system. To minimize the risk of fraud based on stolen passwords, Share this postFacebookTwitterGoogle+LinkedInPinterest