b) Utilities software
-Example: anti-spam program, firewall, anti-spyware and antivirus.
•Authentication is process where users verify that they are who they say they are. The user who attempts to perform function in a system is in fact the user who is authorized to do so.
METHODS OF AUTHENTICATION
• There are two commonly used authentication methods, which are:
1) Biometric devices
- Biometric devices is a device that translates personal characteristics into a digital code stored in the database.
- The example:
a) Fingerprint Recognition
b) Facial Recognition
c) Hand Geometry
d) Iris Scanning
e) Retinal Scanning
f) Voice Recognition
g) Signature Verification System
to prevent fake fingers from being used. Many biometrics fingerprints systems also