Most network security systems rely on single-factor authentication. With this type of authentication,
end users need only one item to verify the username they enter when they log on. This one item is
usually a passwo...
Is C2 the appropriate standard for computer security? (The sidebar "C2 Security: Some Background,", explains the C2 standard.) Most software vendors aspire to C2 security: Microsoft with Windows NT and Novell...