Evaluation:
Published: 02.01.2003.
Language: English
Level: Secondary school
Literature: n/a
References: Not used
  • Essays 'Computer Security', 1.
Extract

Many commercial packages are designed with security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices.
With remembered information, a user is required to enter a word or series of characters that match an entry or security file in the computer. …

Send to email

Your name:

Enter an email address where the link will be sent:

Hi!
{Your name} suggests you to check out this eKönyvtár paper on „Computer Security”.

Link to paper:
https://eng.ekonyvtar.eu/w/287075

Send

Email has been sent