Cargando…
Analysing potential data security losses in organisations based on subsequent users logins
Multi-user computer environments pose potential threats to users data in organisations, in that unauthorised subsequent users who log on to the same computer could leak, alter or delete data belonging to users who previously logged in to the same computer. Such a threat is inspired by Locard’s excha...
Autor principal: | Aziz, Benjamin |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10449169/ https://www.ncbi.nlm.nih.gov/pubmed/37616258 http://dx.doi.org/10.1371/journal.pone.0286856 |
Ejemplares similares
-
OS-9 Remote login User's guide
por: Charity, T
Publicado: (1988) -
Access to Network Login by Three-Factor Authentication for Effective Information Security
por: Vaithyasubramanian, S., et al.
Publicado: (2016) -
Passwordless logins with Yubikey
por: Ahmad, Adeel
Publicado: (2021) -
OS-9 Remote Login User Guide (Revision 14 11 88)
por: Charity, T
Publicado: (1989) -
Gotham: Remote Login Monitoring System
por: Dhar, Mrinal
Publicado: (2016)