The IT Law Wiki
Advertisement

Access authorization

restricts access to or from a computer, server, website, or network to a group of users through the application of authentication systems. These systems can protect either the whole computer, such as through an interactive logon screen, or individual services, such as an FTP server. Many methods are available for identifying and authenticating users, such as passwords, identification cards, smart cards, and biometric systems.[1]

References[]

See also[]

Advertisement