Was this page helpful?
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

Determining Security Strategies

Determining Security Strategies

The Windows Vista security model is based on the concepts of authentication and authorization. Authentication verifies a user's identity, and authorization verifies that the user has permission to access resources on the computer or the network. Windows Vista also includes encryption technologies, such as Encrypting File System (EFS) and public key technology, to protect confidential data on disk and across networks.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

© 2015 Microsoft