|“||restricts access to or from a computer, server, website, or network to a group of users through the application of authentication systems. These systems can protect either the whole computer, such as through an interactive logon screen, or individual services, such as an FTP server. Many methods are available for identifying and authenticating users, such as passwords, identification cards, smart cards, and biometric systems.||”|
References[edit | edit source]
- Good Practice Guide for Computer-Based Electronic Evidence, at 65, Appendix.
See also[edit | edit source]
Community content is available under CC-BY-SA unless otherwise noted.