The article is devoted to the review and analysis of modern approaches which are used today for authentication of users of the computer systems. This is important especially in communication with actuality of problem of defence of computer information and access restriction to the informative and technical resources of cjmputer. The results of the implemented researches and done conclusions can be useful at creation of the own systems of protection of computer information by separate users.
protection of computer information, computer user identification
"Identyfikatsiia korystuvachiv informatsiino-kompiuternykh system: analiz i prohnozuvannia pidkhodiv" [Authentication of users of the informative computer systems: analysis and prognostication of approaches],
Information Processing Systems,