翻訳と辞書
Words near each other
・ Logical Investigations (Husserl)
・ Logical line of operation
・ Logical link control
・ Logical machine
・ Logical matrix
・ Logical Methods in Computer Science
・ Logical model
・ Logical NOR
・ Logical order of God's decrees
・ Logical partition
・ Logical positivism
・ Logical possibility
・ Logical quality
・ Logical reasoning
・ Logical schema
Logical security
・ Logical shift
・ Logical spreadsheet
・ Logical topology
・ Logical truth
・ Logical unit number
・ Logical Unit Number masking
・ Logical volume management
・ Logical Volume Manager (Linux)
・ LogicalDOC
・ Logicalis
・ LogicBoxes
・ LogicBuy
・ Logicism
・ LogicManager


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Logical security : ウィキペディア英語版
Logical security
Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network or a workstation. It is a subset of computer security.
==Elements of logical security==
Elements of logical security are:
*User IDs, also known as logins, user names, logons or accounts, are unique personal identifiers for agents of a computer program or network that is accessible by more than one agent. These identifiers are based on short strings of alphanumeric characters, and are either assigned or chosen by the users.
*Authentication is the process used by a computer program, computer, or network to attempt to confirm the identity of a user. Blind credentials (anonymous users) have no identity, but are allowed to enter the system. The confirmation of identities is essential to the concept of access control, which gives access to the authorized and excludes the unauthorized.
*Biometrics authentication is the measuring of a user’s physiological or behavioral features to attempt to confirm his/her identity. Physiological aspects that are used include fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements. Behavioral aspects that are used include signature recognition, gait recognition, speaker recognition and typing pattern recognition. When a user registers with the system which he/she will attempt to access later, one or more of his/her physiological characteristics are obtained and processed by a numerical algorithm. This number is then entered into a database, and the features of the user attempting to match the stored features must match up to a certain error rate.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Logical security」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.