Saturday, September 28, 2013

"Computer Security"

Computer Security Many commercial packages be designed with security features that control who mess entrée the data processor. These types of access controls use a process c all(prenominal)ed credit and authentication. ac agniseledgment verifies that the substance ab drug drug exploiter is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication atomic number 18 remembered information, have objects, and biometric devices. With remembered information, a user is required to enter a word or series of characters that consort an entry or security file in the computer. Most multi-user operating systems take away into account for a logon enroll, a user ID, and a intelligence (all forms of remembered information) that all must(prenominal) be entered correctly before a user is allowed to use an application program. A logon code usually identifies the application, and a user ID identifies the user. A password usually is confidential, often know only by the user and the system administrator (Baker and Danville, pg 29-47). A have object is any item that a user must carry to gain access to the computer facility. Examples of possessed objects are badges, cards, and keys. Possessed objects are often used in lodge with a ad hominem identification number (PIN), which is a mathematical password (Price, pg 40-68). A biometric device is one that identifies individualized characteristics to authenticate a user. Examples of personal characteristics are fingerprints, voice patterns, signature, sacrifice size, and retinal (eye) patterns. A biometric device usually translates a users personal characteristics into a digital code that is compared to a digital code stored in the computer (Victors, pg 22-85). If the digital code in the computer does not match the users code, access is denied.
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
Each of these authentication techniques has returns and disadvantages. The tabularise below outlines the major advantage and disadvantage of each technique. rise written, to the point, with excellent references cited to provide a mansion foundation for the argument. This report is one of the best Ive seen. The Author give tongue to facts without carrying on about. You spoke with great evidence. Super. Very informative and descriptive. Great references which I am off to check out now for my course. light out up the good work...well done x If you neediness to get a full essay, order it on our we bsite: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.