12
5.5. Digital signature …………………………………………….
126
5.6. Steganography……………………………………………..
136
5.7. Cryptanalysis methods…………………………………….
140
Chapter VI. IDENTIFICATION AND
AUTHENTICATION
144
6.1. Concept of identification and authentication………………..
144
6.2. Password-based authentication ……………………………..
150
6.3. Certificate-based authentication ……………………………
155
6.4. Strict authentication…………………………………………
158
6.5. Biometric identification and authentication of users……….
178
Chapter VII. MECHANISMS TO COMBAT COMPUTER
VIRUSES AND MALWARE
185
7.1. Computer viruses and virus protection issues………………
185
7.2. Antivirus software…………………………………………..
194
7.3. Local system antivirus protection …………………………..
202
Chapter VIII. LOCATION FIREWALLS IN