X hits on this document

Word document

TOPIC: COMPUTER ETHICS AND LEGAL ISSUES - page 10 / 17

42 views

0 shares

0 downloads

0 comments

10 / 17

b) Utilities software

-Example: anti-spam program, firewall, anti-spyware and antivirus.

AUTHENTICATION

Authentication is process where users verify that they are who they say they are. The user who attempts to perform function in a system is in fact the user who is authorized to do so.

METHODS OF AUTHENTICATION

•   There are two commonly used authentication methods, which are:

1) Biometric devices

- Biometric devices is a device that translates personal characteristics into a digital code stored in the database.

- The example:

a) Fingerprint Recognition

b) Facial Recognition

c) Hand Geometry

d) Iris Scanning

e) Retinal Scanning

f) Voice Recognition

g) Signature Verification System

Fingerprint Recognition

-

to prevent fake fingers from being used. Many biometrics fingerprints systems also

Document info
Document views42
Page views42
Page last viewedTue Dec 06 20:03:16 UTC 2016
Pages17
Paragraphs278
Words3165

Comments