CATEGORY: CyberBook
2.3 – Authentication Techniques
Password
In private and public computer networks, authentication is usually done with the use of login IDs (user names) and passwords. Knowledge of the login...
2.2 – Account Accessibility
Identification
The identification procedure collects information about who applied for access. This procedure is generally used by the unique machine-readable names. Based on this system,...
2.1 – Account Administration
Creating a new user is a simple procedure, but it must be secured and protected with organizational security policy procedures. User accounts should not...
2.0 – Access Control Techniques
The basic construct in the establishment of information security regime is regulating how resources which are to be accessed will be protected against network...
1.3 – Number Systems
Binary number system:
Binary number system is a numbering system in which there are only two possible values for each digit: 0 and 1. This also...