
Data access control , the major method of controlling access to stored data, often begins with some form of visitor authentication, though this is not always the case with the Web because many organizations are more interested in attracting rather than restricting visitors to their Web site. A variety of authentication mechanisms may be used (see Table 2.4). The common techniques for the Internet are account number, password, and IP address.
Class |
Examples |
Personal memory |
Name, account number, password |
Possessed object |
Badge, plastic card, key, IP address |
Personal characteristic |
Fingerprint, voiceprint, signature, hand size |
- 瀏覽次數:1845