Essay Database

Need an original paper?
Like us on Facebook in December and win FREE subscription to THOUSANDS high-quality essays and term papers
Like us on Facebook in December and win FREE subscription to THOUSANDS high-quality essays and term papers

"Computer Security"

Date Submitted: 09/09/2003 07:18:26
Category: / Science & Technology / Computers and Cybernetics
Length: 2 pages (424 words)
Computer Security Many commercial packages are designed with security features that control who can access the computer. These types of access controls use a process called identification and authentication. Identification verifies that the user is a valid user, and authentication verifies that the user is who he or she claims to be. Three common methods of authentication are remembered information, possessed objects, and biometric devices. With remembered information, a user is required to enter a …
Is this Essay helpful? Join now to read this particular paper
and access over 480,000 just like this GET BETTER GRADES
…techniques to secure it from accidental or intentional misuse. In addition, the organization should review the techniquesin place regularly to determine if they are still appropriate. Works Cited Baker, Jamie D. and Cynthia I. Danville. : Security, Ethics, and Privacy." Computers and Society Journal Feb. 1999: PG 29-47. Price, Karen E. "Identification and Authentication Controls." Word 97, Project 3. http://www.scsite.com/wd97/pr3.htm (31 Aug. 1999). Victors, Michael R. The computer Auditor. St. Louis: Green Valley Publishing Company, 1999.
Need a custom written paper? Let our professional writers save your time.