Vērtējums:
Publicēts: 02.01.2003.
Valoda: Angļu
Līmenis: Vidusskolas
Literatūras saraksts: Nav
Atsauces: Nav
  • Eseja 'Computer Security', 1.
Darba fragmentsAizvērt

Many commercial packages are designed with security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.
With remembered information, a user is required to enter a word or series of characters that match an entry or security file in the computer. …

Atlants