How to select a password management system: Envelope technology and the story about the never-changing password

Valin, Oded
November 2007
IM@T.Online;Nov2007, p6
Trade Publication
The article provides insights on efficient password management systems. It considers safety and security as two important elements in a password system and notes that disaster recovery, automation and high availability serve equal importance in managing passwords. It likewise adds that companies need advanced password storage systems that could transparently manage and automatically synchronize passwords. Moreover, it recommends several devices which need to be integrated with password management systems including Oracle Database, MySQL and IBM Informix.


Related Articles

  • A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS. Shahri, Ahmad Bakhtiyari; Ismail, Zuraini // Journal of Information Security;Apr2012, Vol. 3 Issue 2, p169 

    Security remains to be a critical issue in the safe operation of Information Systems (IS). Identifying the threats to IS may lead to an effective method for measuring security as the initial stage for risk management. Despite many attempts to classify threats to IS, new threats to Health...

  • Oracle database security and protection. CaixiaMa; WeiZhang; ZhigangZhang; YanminWang // Applied Mechanics & Materials;2014, Issue 571-572, p586 

    Database security is the protection of the database date, which can prevent the leakage, alteration, destruction of the information caused by the unauthorized user use the database. Those protective measures usually include: authentication, access control, access control, database backup and...

  • Security apps can't weather Storm. Vaas, Lisa // eWeek;11/12/2007, Vol. 24 Issue 35, pE1 

    The article focuses on the usefulness of the Storm botnet. Storm botnet is also known as the storm worm botnet which overpowers most of the anti-virus and the access control systems. The principal security strategist of IBM Internet Security System Joshua Corman states that the storm botnet is...

  • IPLocks reinforces security tool. Messmer, Ellen // Network World;11/8/2004, Vol. 21 Issue 45, p21 

    This article reports that database-security software vendor IPLocks has announced a new version of its database monitoring, assessment and analysis tool. The IPLocks software, which runs on a 32-bit Linux or Windows server inside the network to check each corporate database, now supports IBM's...

  • Component Approach to Software Development for Distributed Multi-Database System. Muthaiyan, Madiajagan; Balakrishnan, Vijayakumar; Srineevasan, Sri Hari Haran // Informatica Economica;2010, Vol. 14 Issue 2, p19 

    The paper deals with a component based approach for software development in a distributed environment for the database retrieval operations. A Core Component for a distributed multi-database system has been proposed. The core Component is modeled using three interfaces User, Administrator and...

  • Database Security. Davida, George I.; Linton, David J.; Szelag, C. Russell; Wells, David L. // IEEE Transactions on Software Engineering;Nov78, Vol. 4 Issue 6, p531 

    Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a database where all the queries in the set...

  • Matching Attack Patterns to Security Patterns Using Neural Networks. Adebiyi, Adetunji; Arreymbi, Johnnes; Imafidon, Chris // Proceedings of the European Conference on Information Warfare & ;2012, p9 

    The issue of information systems security and its consequences have raised so much concern in many public and private domains, and as hackers attacks on software continues to increase, the demand for secure software has also increased significantly. The industry has been looking at better ways...

  • Semantic Inference Model For Database Inference Detection Violation. Chopade, Rupali; Jagdale, B. N.; Savyanavar, Amit // International Journal on Computer Science & Engineering;2011, Vol. 3 Issue 2, p830 

    Database Security has become a major problem in modern day's applications. Generally for Information security everybody tries to protect sensitive data by using different security techniques. Despite these security measures, a malicious user can access non-sensitive information and can infer...

  • A New Approach to Enterprise Data Security: Tokenisation. Palgon, Gary // Database & Network Journal;Apr2010, Vol. 40 Issue 2, p14 

    The article offers information on tokenisation, an approach in protecting enterprise data security. It explains that tokenization or token serves as surrogate for an actual cipher text, which can be used safely by any file, database, or application; therefore lessening the risk of data exposure....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics