EIS-Notes-by-CA-Hemang-Doshi-Sir_67.pdf - \u2022 \u2022 If the caller is authorized the call back device dials the caller\u2019s number to establish a new

EIS-Notes-by-CA-Hemang-Doshi-Sir_67.pdf - u2022 u2022 If...

This preview shows page 1 out of 1 page.

67 If the caller is authorized, the call back device dials the caller’s number to establish a new connection. This helps to avoid the call forwarding and man-in-the middle attack (4)Operating System Access Control: Operating System is the computer control program. It allows users and their applications to share and access common computer resources, such as processor, main memory, database and printers. Protecting operating system access is extremely crucial and can be achieved using following steps. (i)Terminal identification: This will ensure that only approved terminal can initiate a specified session. (ii)Terminal log-in procedures: A log-in procedure prevents unauthorized access to the system. When the user initiates the log-on process by entering user-id and password, the system compares the ID and password to a database of valid users and accordingly authorizes the log-in. (iii)Terminal time out:
Image of page 1

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture