Xem mẫu

Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 15 Computer Security Techniques Dave Bremer Otago Polytechnic, N.Z. Roadmap • Authentication • Access Control • Intrusion • Malware Detection Defense • Dealing With Buffer Overflow Attacks • Windows Vista Security Authentication • Basis for most type of access control and accountability • Two steps – Identification – Verification Means of Authentication • Traditionally listed as three factors • Something you know – Password, PIN • Something you have – Card, RFID badge • Something you are – Biometrics A different take • Nick Mathewson is attributed with turning these factors into: – Something – Something – Something you had, you forgot, you were! ... - tailieumienphi.vn
nguon tai.lieu . vn