computer security

Alice sends a password, and Bob compares it against a database of passwords. What is the computer security threat as far as authentication?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"