 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
|
Unauthorized
Access and Use
|
|
|
|
|
What
is a callback system?
|
|
|
|
|
 |
 |
 |
 |
|
User connects to computer only
|
|
after the computer calls that user
|
|
back at a previously established
|
|
|
telephone number
|
|
|
|
 |
 |
 |
 |
 |
 |
Some networks utilize callback
|
|
systems as an access control
|
|
|
method to authenticate remote
|
|
|
or mobile users
|
|
|
|
|
|
 |
 |
 |
 |
 |
 |
|
Callback systems work best for
|
|
|
users who regularly work at
|
|
|
the same remote location,
|
|
such as at home or branch office
|
|
|
|
|
 |
|
|
 |
|
|
|
|
|