Many commercial packages are designed with security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.
With remembered information, a user is required to enter a word or series of characters that match an entry or security file in the computer. Mos…
- "Computer Security"
- Computer crime
Questions of Ethics in Computer Systems and their Future
E-pasta adrese, uz kuru nosūtīt darba saiti:
Saite uz darbu: