CSCI 4531 Lecture Notes - Lecture 7: Computer Security, Mandatory Access Control, Eeprom

52 views5 pages

Document Summary

10/11/2016 - chapter 3 (cont"d) & chapter 4: access control. Can store but do not process data. The most common is the magnetic stripe card. Can be used alone for physical access. Provides significantly greater security when combined with with a password or. A smart token that looks like a bank card. Can look like calculators, keys, small portable objects. Manual interfaces include a keypad and display for interaction. Electronic interfaces communicate with a compatible reader / writer. Most important category of a smart token. May use any of the smart token protocols. Stores data that does not change during the card"s life. Holds temporary data generated when applications are executed. Attempts to authenticate an individual based on unique physical characteristics. Is technically complex and expensive when compared to passwords and tokens. Diagrams in slides about biometrics and how they work. Authentication over a network, the internet, or a communications link is more complex.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents