What forms of authentication can be implemented for a web application?  Describe three authentication techniques and the level of security provided by each.