Information Security Concepts: Confidentiality, Integrity ...

Technology we use the following elements: Authentication, Authorization, and Access Control. Authentication should come first: Is the person or agent who they claim to be? In the physical world we might check a picture ID, or have them present a card and enter a PIN. Comupter systems at minimum should ask for a user ID and password. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download