One of the problems in internet security is the secureness of connection. It can be addressed to the technical area. The authentication process then becomes the opportunity to intercept traffic and get necessary information. Technical imperfection of authorization solutions facilitates the process of acquiring the authorization data for the third parties (Arief & Besnard, 2005).
<... read more3 pages
900 words