TITLE

Speak Up! Voice Boosts Authentication

AUTHOR(S)
Heirendt, Paul S.
PUB. DATE
October 2010
SOURCE
Multichannel News;10/11/2010, Vol. 31 Issue 38, p31
SOURCE TYPE
Periodical
DOC. TYPE
Opinion
ABSTRACT
In this article the author reflects on the significance for business companies to implement multi-factor authentication system to protect their services in the U.S. He discusses the implications of the concept of "shared secrets" since it leads to the exposure of the confidential information. The author contends the complexity of the multi-factor authentication system, however, he points out that it makes a very secure interaction.
ACCESSION #
57220278

 

Related Articles

  • Analysis of the Univariate Microaggregation Disclosure Risk. Nin, Jordi; Torra, Vicen� // New Generation Computing;2009, Vol. 27 Issue 3, p197 

    Microaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces the original data with the centroid of such cluster. As clusters contain at...

  • Read-write rule property research of the combined function about the confidentiality and integrality. Liu Yi-he // Journal of Communication & Computer;May2008, Vol. 5 Issue 5, p40 

    Read-write rule about the combined function at the article function will be discussed in this paper. There are some good properties about the function, and its read-write rule is a read-write rule expansion of BLP model and Biba model by analysis in this paper.

  • Securing Your Clients' Information. GIACHETTI, THOMAS D. // Investment Advisor;Jan2013, Vol. 33 Issue 1, p49 

    The article focuses on issues related to the maintenance of integrity of clients' information and the integrity of client assets by investment advisors. It is noted that a confidentiality agreement should be requested while initiating a contract. It is stated that an advisor can ask the landlord...

  • Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data. Xiao-Bai Li; Sarkar, Sumit // Information Systems Research;Dec2011, Vol. 22 Issue 4, p774 

    Record linkage techniques have been widely used in areas such as antiterrorism, crime analysis, epidemiologic research, and database marketing. On the other hand, such techniques are also being increasingly used for identity matching that leads to the disclosure of private information. These...

  • Stronger's gag order lets county work in the shadows. Skoning, Gerald D. // Crain's Chicago Business;6/23/2008, Vol. 31 Issue 25, p14 

    The author reflects on the confidentiality agreement proposed by Cook County Board President Todd Stroger. He considers that Stroger's move to get the agreement signed by county employees is unprecedented, hypocritical and an example of a cynical administration. The agreement bans the disclosure...

  • FEDERAL RULE OF EVIDENCE 502: HAS IT LIVED UP TO ITS POTENTIAL? Grimm, Paul W.; Bergstrom, Lisa Yurwit; Kraeuter, Matthew P. // Richmond Journal of Law & Technology;2011, Vol. 17 Issue 3, p1 

    The article focuses on the rules under the Federal Rule of Evidence 502 in dealing with issues on the discovery of electronically stored information (ESI) and its mitigation. It says that Rule 502 must explain and restrict the impact of discovery of protected and privileged information and...

  • Preventing identity theft: 6 steps to protect employees' data.  // HR Specialist: Ohio Employment Law;Sep2009, Vol. 3 Issue 9, p4 

    The article presents steps to avoid identity theft by protecting employee data. It notes that employers may face penalties for letting employee's personal information fall into unauthorized persons whether with intention or just negligent. These steps include securing job applications, requiring...

  • DEPARTMENTS REQUIRED TO BEEF UP SECURITY.  // Public Sector;Apr2008, Vol. 31 Issue 1, p4 

    The article reports that privacy commissioner in New Zealand, is requiring some government departments to improve security when transferring data to other departments. According to Marie Shroff, the requirements followed a review of data matching programme security, which was prompted by data...

  • Are you practicing secure collaboration, or is it chaotic? Faitelson, Yaki // IM@T.Online;Aug/Sep2011, p1 

    The article offers suggestions to organizations on how to manage and protect confidential digital information and practice secure collaboration. According to the author, organizations face the challenges of distrust among their employees when email or credit card information get stolen. The...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics