First page Back Continue Last page Overview Graphics
Identification and Authentication
Identification is at the root of much of computer security.
It is involves both identifying who the user and verifying that the user is who they claim to be.
Trusted operating systems require secure identification and each individual must be uniquely identified.
Notes: