2.2 – Account Accessibility

2.2 – Account Accessibility
Identification – The identification procedure collects information about who applied for access. This procedure is generally used by the unique machine-readable names. Based on this system, authentications are validated, enabling access. In terms of human, users and resource connect in mutual identification when they apply for access permission. For example, during phone calls, people tell others their names over the calls as a form of authentication. That builds trust and facilitates information sharing. When a system is built with no way to enforce identification, bad things happen. In the case of Moldovan Trojan, the breach of identification arises when there…
To access this content, you must subscribe to this Africa's Sankofa Innovation or Cybersecurity And Digital Forensics, or log in if you are a member.

Share this post