home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page102.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  125KB  |  817x1045  |  8-bit (256 colors)
Labels: book | comic book | hakham | mountain | poster | sky | traffic light | windowpane
OCR: CHAPTER SECTION E Password Security USER IDS passwords and personal identification numbers (PINs) are fact everyday life in the information age They are required for activities such as using ATMs and debit cards, logging into Windows accessing wire- less networks, making an iTunes purchase, instant I messaging. reading e-mail, and file sharing. Many Web sites encourage you to sign up for mem- bership by choosing user D and password. Section provides information about selecting secure passwords and managing the mountain passwords you collect and tend to forget. AUTHENTICATION PROTOCOLS What 1 an authentication protocol? Security experts use the term authentication protocol to refer to any method that confirms person's FIGURE 1-41 identity using something the person knows, something the pers ...