Computer Science Management

Network and computer security

The most surprising thing in Chapter 5 was the concept of AAA which implied to Authentication, Authorization as well as Auditing. Assessment of people’s identity can be achieved through requesting permission of resource use through the process of authentication. It was also surprising to note that specified permissions can be granted to any authenticated user through a process of authorization. A network system can also conduct auditing or accounting which involves collection of information concerning a person for analysis through the provision of log files.