(a) Privacy law
The privacy laws in Malaysia emphasises on the following: • Security Services to review the security policy Security Management to protect the resources Security Mechanism to implement the required security services Security Objects, the important entities within the system environment
(b) Utilities software
Example: anti-spam program, firewall, anti-spyware and antivirus.
1.2.2.2 State authentication & verification methods/ technologies.
Methods of Authentication
There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking system that authenticates the user.
Methods of Verification
Tiada ulasan:
Catat Ulasan