Controlling Access to Data, Computers, and Networks
Guidelines for manual data handling
Access privileges
Access control based on what you know
Password schemes
Access control based on what you have
Access control based on where you are
Access control based on who you are
Previous slide
Next slide
Back to first slide
View graphic version