X hits on this document

Word document

TOPIC: COMPUTER ETHICS AND LEGAL ISSUES - page 13 / 17

54 views

0 shares

0 downloads

0 comments

13 / 17

WHY IS AUTHENTICATION IMPORTANT?

Authentication is important in order to safeguard againts the unauthorized access and use.

VERIFICATION

Verification is the act of proving or disapproving the correctness of a system with respect of a system with respect to a certain formal specification.

METHODS OF VERIFICATION

There are two methods commonly used in verification, which are user identification and processed object.

User identification refers to the process of validating the user.

Processed object refers to something the user has such as identification card, security token and cell phone.

USER IDENTIFICATION

The examples of validating process using the user identification are:

-Key in the user name to log in to a system and the system will verify whether the user is valid or invalid user.

-Show the exam slip to verify that you are the valid candidate for the exam.

-Show a passport before departure.

PROCESSED OBJECT

The examples of validating process using the processed object are:

-The policeman will check on the driver's license to identify the valid driver.

-Employees have to swipe their security card to enter the building.

-Buy blouses at the mail using a credit card.

Document info
Document views54
Page views54
Page last viewedWed Jan 18 06:33:59 UTC 2017
Pages17
Paragraphs278
Words3165

Comments