Security

Proportional Study of Human Recognition Methods

Download Now Free registration required

Executive Summary

The purpose of this paper is to study about the various methods, which are mainly used in the authentication area. Information technology (IT) systems, their stored data and the processes are valuable resources, which need to be protected from outer world. First step toward securing an IT system is the ability to verify the identity of its users. The process of verifying a user's identity is typically referred to as user identification and authentication. Passwords are the methods that were used most often for authenticating computer users, but this approach has often proven inadequate in preventing unauthorized access to computer resources when used as the sole means of authentication.

  • Format: PDF
  • Size: 536 KB