Page 20 - PowerPoint Presentation
P. 20

1.  Identification               a. log of events

                          2.  Authentication               b. proving as the identity

                          3.  Authorization                c. claiming an identity

                          4.  Auditing                     d. check for violations


                          5.  Accountability               e. allow or deny access


















































               ITEC106 – Systems Security                                       Mr. John Mark L. Dula
   15   16   17   18   19   20   21   22   23   24   25