Network security consists of the policies adopted to prevent and monitor authorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Users are assigned an ID and password or other authenticating information
something the user has a security token or 'dongle', an ATM card, or a mobile phone
A security token (or sometimes a hardware token, authentication token, USB token, cryptographic token, software token, virtual token, or key fob) may be a physical device that an authorized user of computer services is given to ease authentication. The term may also refer to software tokens.
Key Fobs
Key Fobs
A fob, or more commonly called a key fob, is a small security hardware device with built-in authentication used to control and secure access to network services and data.
The key fob displays a randomly generated access code, which changes periodically,
A user first authenticates themselves on the key fob with a personal identification number (PIN), followed by the current code displayed on the device.
//
New Technology File System (NTFS)
NTFS supports the creation of user and group accounts with different levels of access to folders and files and the use of the Encrypting File System (EFS) for user-specific encryption of individual files and folders.
///
///
Thursday, August 27, 2015
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment