First page Back Continue Last page Image
- Process of verifying the identity of a user
- Example Methods:
- Physical “keys”
- Passwords and Biometric
- Example Threats:
- Brute force or Dictionary cracking
- What is the future of Authentication…?
Confidentiality
Password:
* * * * * * * *
Keeping the Data Private
https://www.youtube.com/watch?v=VgC4b9K-gYU