Security features that control that can access resources in the OS.
Answers
Answered by
3
Answer:
Access control systems perform identification authentication and authorization of users and entities by evaluating required login credentials that can include passwords, personal identification numbers (PINs), biometric scans, security tokens or other authentication factors.
Similar questions
English,
4 months ago
English,
4 months ago
English,
10 months ago
Computer Science,
10 months ago
History,
1 year ago