Security - ID & Authentication
Proof of Identify
- People
- Systems (Computers, Modems, Processes, ...)
All other security services are dependent on this service
Mechanisms
- Something you know (passwords, phrases, ...)
- Something you have (keys, tokens, smartcards)
- Something you are (fingerprint, retinal scan, DNA)
Author | Title | Track | Home