Advertisement
Guest User

uhjhujnu

a guest
Jul 2nd, 2015
229
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.29 KB | None | 0 0
  1. • Benifites of authentication:
  2.  
  3. 1. Minimal involvement needed from end users.
  4. 2. No additional hardware needed.
  5. 3. Easy to manage.
  6. 4. Certificates are natively supported by many enterprise applications and networks.
  7.  
  8.  
  9.  
  10. • Secure coding:
  11.  
  12. It is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities. Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. By identifying the insecure coding practices that lead to these errors and educating developers on secure alternatives, organizations can take proactive steps to help significantly reduce or eliminate vulnerabilities in software before deployment.
  13. • Capability:
  14.  
  15. A capability is the ability to perform or achieve certain actions or outcomes through a set of controllable and measurable faculties, features, functions, processes, or services.
  16.  
  17. • Access control list:
  18.  
  19. An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement