answersLogoWhite

0


Best Answer

Operating system data file protection through authentication is very important. A file can be any important document which may contain data or information that may be very valuable for the company or the owner of the file. If proper authentication is not carried out then the company can incur loss of data, expose to viruses and trojan attacks and can face a lot of issues. Authentication also increases the value of the information saved in the files because it does not appear fake. By giving the authentication to the people, you can ensure that no unauthorized person will access the file or imitate it. Just take the example of art work of a person saved in a file. Therefore, identification of the person is very necessary before sharing any file with any other person.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

15y ago

why authentication is important for file protection. why authentication is important for file protection in operating system

This answer is:
User Avatar

User Avatar

Wiki User

15y ago

Authentication is important because it keeps the information stored on the system safe from many potential intruders.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Why authentication in important for file protection?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a reason to implement Kerberos over local system authentication?

Centralized file integrity protection!


How you can configure the file server?

For creating file servers on network try out NFS and for user authentication you acan try NIS.


The authentication protection method is determined by either the communication mechanism or the settings in the what?

local security policy


What is Computer Authentication?

Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access.


How do you devolop passport authentication using aspnet?

How can I get a batch file (that calls on an executable file and a .fil file) that is made for a 32 bit application to work on a 64 bit win 7?


What configuration file is used to tell Linux which system to use for name resolution and authentication?

/etc/ncsd.conf


What types of services does SafeNet offer to consumers?

Safenet is a data protection company. They provide this service to governments and financial companies. Data protection services include authentication services.


What file is used to tell a Linux system which resources to use for services such as authentication and name resolution?

/etc/nsswitch.conf


What types of websites would require a user authentication to access them?

Many websites require user authentication to access them. This is in order to create security for its members. With a username and password, users can be uniquely identified while having protection.


Is clean master the best virus protection and file cleaning software for my sellphone?

It is among the best virus protection and file cleaning software.


Can you file for protection against a company?

What type of protection are you looking for? If you are trying to keep from paying a debt, there is bankruptcy protection.


Can the MAC address be changed so as to defeat the Local MAC authentication protection?

Yes, it's possible to spoof a MAC address.