![]() |
![]() |
|
![]() |
![]() |
![]() |
![]() | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Method | Comments |
---|---|
Username and Password | Works with honest people. Not considered adequate for any but the lowest security environments. |
Token | Keycards, Number Generators and the like. Proves that the user possesses and knows how to use the device. |
Biometrics | The measurement of some physical attribute of the user ensures that it is the user who is logging in. Finger and Palm Prints, Voice Prints, Face Prints, Foot Prints, etc.. Sometimes these methods will be used together as an extra check. These methods are becoming economically viable. |
Remember: All these methods fail if the user logs in and then leaves the terminal unattended. Physical security must not be overlooked.
![]() |
|||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Web Author: Geoff May | Last Update: 06/11/2001 |
© Copyright 1997 - 2001 by Network Business Services Pty Ltd. All Rights Reserved. |