Ndubuisi Ekekwe
AUTHOR: Ndubuisi Ekekwe
No Congratulations Yet – Glo Has Not Acquired 9Mobile
Bubbling Coins – Today’s ICOs are 1990s’ IPOs
2.3 – Authentication Techniques
Password In private and public computer networks, authentication is usually done with the use of login IDs (user names) and passwords. Knowledge of the login details is pretended to make sure that the user is authentic. Each user registers at first using a given or self-declared password. On each successive use, the user must know […]
2.2 – Account Accessibility
Identification The identification procedure collects information about who applied for access. This procedure is generally used by the unique machine-readable names. Based on this system, authentications are validated, enabling access. In terms of humans, users and resources connect in mutual identification when they apply for access permission. For example, during phone calls, people tell others […]
2.1 – Account Administration
Creating a new user is a simple procedure, but it must be secured and protected with organizational security policy procedures. User accounts should not be created at anyone’s request or urge of an admin. Rather, a strict process should be followed that flows from the HR department hiring process. The formal request for a new […]






