Page "Computer security" Paragraph 18
from
Wikipedia
* Access authorization restricts access to a computer to group of users through the use of authentication systems.
These systems can protect either the whole computer – such as through an interactive login screen – or individual services, such as an FTP server.
There are many methods for identifying and authenticating users, such as passwords, identification cards, and, more recently, smart cards and biometric systems.
Page 1 of 1.
1.811 seconds.