Next: Physical Keys
Up: General Issues
Previous: General Issues
Generally, a user's first activity when starting a session with
a secured computer system is identifying himself/herself to the system.
The most common ways to identify and authenticate users are by the
use of physical keys, account names and passwords, and biometric checks.
Fri Oct 7 16:17:21 EDT 1994