National Repository of Grey Literature 1 records found  Search took 0.01 seconds. 
Methods of users autentization in IS
Nazaryan, Armen ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
The Objectives were it to inform the work of outsider Even Slightly hip readers of information technology to the Characteristics of authentication technologies, Their Advantages and disadvantages of a Retrospective Comparison of Methods of logging. Paper outlines the Implementation Process and describes its examples. The Practical Part of the Imperfection of Technology Shows Some errors and biometric security Methods. The structure of work is Divided Into 4 Basic Headings, ergot, authentication methods, Basic Characteristics of names and passwords, and Their proper use, and the Implementation Process and Practical part, the two WHERE Attempts to break the biometric security. Both Attempts were also we Contribution on Methods of authentication. The experience I gained Valuable during Their Performance In the future I definitely has more efforts to keep sensitive data and Forms of Access, The Greatest caution.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.