Back Doors and Magic Words

Dingle, Jeff
August 2006
Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p38
Trade Publication
The article reflects on the design of access control systems. The technique of using "secret back doors" in ID and access control systems for convenience and ease of access for maintenance and security is common in the design of these systems. It also discusses the "zero in/zero out" personnel management policy of corporations.


Related Articles

  • THE NEW Edge. Hodgson, Karyn // SDM: Security Distributing & Marketing;Nov2010, Vol. 40 Issue 11, p71 

    The article focuses on the improvements of perimeter access control and security. It notes that as perimiter has developed, so is mechanisms to protect those spaces has revolutionized including more usages of high-tech security products available to the access control world. It says that while...

  • 7 Trends Moving Integrators Towards Physical-Logical Convergence. Engebretson, Joan // SDM: Security Distributing & Marketing;May2011, Vol. 41 Issue 5, p95 

    The article offers the author's insights on physical-logical convergence innovations for access control used for physical access to entry doors and logical access to enterprise-wide computer systems. It states that Open Protocol for Access Control Identification and Ticketing (OPACITY) is a new...

  • Port Freeport Enhances Security.  // Journal of Commerce (1542-3867);10/1/2012, Vol. 13 Issue 34, p63 

    The article reports on the construction of a new security gate with state-of-the-industry access control systems and traffic arms by Port Freeport in April 2012.

  • Access breaches hit 10% of firms.  // New Media Age;3/18/2004, p13 

    Reports on the percentage of large British companies that have suffered serious fraud or confidentiality breaches in 2003 due to unauthorized computer access, according to the 2004 Security Breaches Survey of the Department of Trade and Industry. Causes of unauthorized access; Action taken by...

  • The Second Immutable Law of Security Administration. Bragg, Arnold W. // IT Professional;Nov/Dec2009, Vol. 11 Issue 6, p4 

    The article provides the author's insights regarding the issues in statistical computing addressed in a 50-minute panel discussion. The author relates the experience of a famous statistician, the first speaker in the discussion, in working with that require a high level of security. It notes...

  • More WiFi worries ahead.  // Accountancy;Jul2008, Vol. 142 Issue 1379, p69 

    This article discusses the development of devices that can find a wireless Internet router at a distance of 300 yards. Security consultant David Hobson from Global Security Systems Inc. comments on the simplicity of constructing an extended range wireless antenna. The creation of a guest server...

  • Weighing up the security options.  // Computer Weekly;4/25/2006, p24 

    The article presents information related to information security. It is reported that the 11 commandments on security infrastructure provide a rapid evolution to a new security paradigm. Moreover, it is informed that the Jericho group, which is backed by many FTSE 100 companies, has been...

  • Employees really want to use their personal devices at work. Dillow, Clay // Fortune.com;10/21/2013, p1 

    The article examines computer security management by business enterprises. The difficulties posed for security of information technology and computer networks by the increasing insistence of employees that they use personal computers such as smartphones or tablet computers for work purposes are...

  • 2 NAC: Hot, but Hot fully baked. Greene, Tim // Network World;1/15/2007, Vol. 24 Issue 2, p28 

    The article presents the network access control (NAC) technology. According to the author, NAC provides a combination of user ID, machine ID, machine configuration and access method in determining whether a device should gain network access. It also keeps track of key configuration metrics and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics