TITLE

It's Good to be Single

AUTHOR(S)
Zalud, Bill
PUB. DATE
February 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Feb2009, Vol. 46 Issue 2, p42
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the benefits of single sign on (SSO) against digital and physical threats. It is stated that SSO helps the user to access multiple applications he is authorized to access by providing his credentials once. Digital threats include hackers, viruses or network bottlenecks, while physical threats include human error, fire or cooling problems. SSO brings together digital and physical security applications and simplifies security needs by providing higher level of protection.
ACCESSION #
36619567

 

Related Articles

  • A Future of Collaboration and Convergence. Barreto, Nelson // Security: Solutions for Enterprise Security Leaders;Sep2013, Vol. 50 Issue 9, p104 

    The article offers the author's insights on the trends in access control systems among security enterprises. He states that security threats in the industry increased collaboration efforts among business enterprises, security providers, and responding authorities. He mentions that the increased...

  • Preparing for the Inevitable Cyber-Attack. Jaeger, Jaclyn // Compliance Week;Apr2012, Vol. 9 Issue 99, p12 

    The article reports on the new threat to corporate networks, specifically the hackers equipped with detailed knowledge about the inner workings of the networks' security systems. Corporate vice president Scott Charney says companies need to improve basic hygiene such as designing systems that...

  • HACKERS CAN CRACK CAR-KEY CODES.  // Consumer Reports;Jun2005, Vol. 70 Issue 6, p9 

    Discusses how security codes in car keys or wireless gas-payment tags can be hacked using an inexpensive homemade decoder. Way that the security systems rely on radio-frequency ID tags; Process that hackers use to gain security codes; Assertion within the automobile industry and at ExxonMobil...

  • Sweet-Talking the C-Suite. Plante, Amber // Information Security;Sep2005, Vol. 8 Issue 9, p18 

    Presents social engineering guidelines to enhance the C-suite's attitude toward security. Use of pre-wired social responses to pull the discussion on one's favor; Importance of reciprocation.

  • A Proposed Integrated Framework for Coordinating Computer Security Incident Response Team. Bhaskar, Rahul // Journal of Information Privacy & Security (Ivy League Publishing;2005, Vol. 1 Issue 3, p3 

    Traditionally, computer security incident response teams (CSIRT) are expected to respond to hacking incidents, rogue employees, or virus outbreaks. Recently, they are maturing into a critical tool for maintaining business operations, homeland security, and compliance with new regulations....

  • Coalesce Model to Prevent Format String Attacks. Shekhar, Jayant; Yadav, Seema; Ahmad, Khaleel // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p427 

    Format string attacks cause serious security problems in the field of software security in computer world. Testing and implementation against to Format String vulnerabilities can avoid result due to working of Format String Bugs. In this paper, we have proposed eight novel approaches to prevent...

  • Surviving Hacker Attacks Proves that Every Cloud Has a SILVER LINING. Cheng, Kirby // Computers in Libraries;Mar2005, Vol. 25 Issue 3, p6 

    This article presents a narrative on how the author dealt with computer hackers. The first hacker attack occurred when I was a new administrator. Late at night, the campus Information Technology (IT) department's network monitoring system detected an unusually high volume of traffic originating...

  • UK companies 'play into the hands' of hackers.  // Financial Management;Jun2004, p5 

    Reports on the findings of a study conducted by the British Trade Department regarding the information security measures being implemented by companies. Breach on information technology defense systems in firms that rated security as a high priority; Factors contributing to increased hacking...

  • Half-Open Scanning.  // Network Dictionary;2007, p223 

    A definition of the term "half-open scanning" is presented. It refers to a system used by a malicious computer hacker to determine the state of a communications port without establishing a full connection. The system, which is also known as SYN scanning, can be used to perform denial-of-service...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics