Saturday, October 26, 2013

"Computer Security"

Computer Security Many commercial packages be designed with security features that control who mess approach shot the data processor. These types of access controls use a process c all(prenominal)ed credit and authentication. assignment verifies that the substance ab drug substance abuser is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, have objects, and biometric devices. With remembered information, a user is required to enter a word or series of characters that consort an entry or security file in the computing machine. Most multi-user operating systems aim into account for a logon grave, a user ID, and a parole (all forms of remembered information) that all must(prenominal) be entered correctly before a user is allowed to use an application program. A logon code usually identifies the application, and a user ID identifies the user. A password usually is confidential, often chouse only by the user and the system administrator (Baker and Danville, pg 29-47). A possess object is any item that a user must carry to gain access to the computer facility. Examples of possessed objects are badges, cards, and keys. Possessed objects are often used in lodge with a in the flesh(predicate) identification number (PIN), which is a mathematical password (Price, pg 40-68). A biometric device is one that identifies ad hominem characteristics to authenticate a user. Examples of personal characteristics are fingerprints, voice patterns, signature, grant size, and retinal (eye) patterns. A biometric device usually translates a users personal characteristics into a digital code that is compared to a digital code stored in the computer (Victors, pg 22-85). If the digital code in the computer does not match the users code, access is denied.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
Each of these authentication techniques has returns and disadvantages. The knock back below outlines the major advantage and disadvantage of each technique. wellhead written, to the point, with excellent references cited to provide a mansion foundation for the argument. This topic is one of the best Ive seen. The Author give tongue to facts without carrying on about. You spoke with great evidence. Super. Very informative and descriptive. Great references which I am off to check out now for my course. total out up the good work...well done x If you take to get a full essay, order it on our website: OrderEssay.net

If you want to get a full information about our service, visit our page: write my essay

No comments:

Post a Comment