Security testing: Difference between revisions

Content deleted Content added
m References
Line 18:
 
==Authentication==
This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one.vv
 
==Authorization==