In this case security is achieved by providing the user with limited access. It means that user can only perform those tasks which are allowed by system designer. Its' simple example is bank's ATM. Where user can't perform operations on database other than provided.
No comments:
Post a Comment