• slide-1
  • slide-2
  • slide-3
  • slide-4
  • slide-5

Directory: All Listings 

Filter listings...

ID Control is the specialist in advanced identity and access management for online banking with the authentication solutions: - ID Control USB token (with PKI support); - ID Control OTP Key; - HandyID; - MessageID; - KeystrokeID; - ID Control Server.

Category:Banners

AAA server is an access control framework server. The three As stand for Authentication, Authorization and Accounting. Authentication verifies the person's (or machine's) identity: that is, confirms that the entity seeking access is who or what it claims ...

Category:Security

An AUP is a formal definition of the organization's terms and conditions for the use of its equipment or services. It often refers specifically to Internet use. For example, a company's Internet AUP would specify what is and what is not acceptable use of ...

Category:Security

The prevention of unauthorized access to the resources of an IT product, programs, processes, systems, or other IT products. Some suppliers consider preventing unauthorized users from logging on to the system to be access control. In reality, access cont ...

Category:Security

An ACL is a common mechanism used to specify Access Permissions. In its simplest form, it is a list for each managed object (files, devices, etc) in a system. The list specifies which subjects can perform which types of access to which object. If the subj ...

Category:Security

This is the level of authority required by an entity to access an object. See also 'security classification' and 'security clearance'.

Category:Security

A set of permissions associated with every file and directory that determines who can read it, write to it, or execute it. Only the owner of the file (or the super-user, Administrator or God Account) can change these permissions. Maintaining access permis ...

Category:Security

In the singular, 'right' is permission for an entity to access a particular object for a specific operation. Collectively, 'access rights' is synonymous with access permissions.

Category:Security

A security device that normally attaches to a COM or USB port on a system which, when used in conjunction with appropriate software or hardware, allows authorized access to that system. Examples include smart cards and smart card readers, or USB Tokens su ...

Category:Security

One of the fundamental requirements of information security, accountability is the property that enables activities on a system to be traced to specific entities; who or which may then be held responsible for their actions. It requires an authentication s ...

Category:Security

ActiveX is code which defines Microsoft's interaction between Web servers, clients, add-ins and Microsoft Office applications. Basically, be afraid. Be very afraid. ActiveX applications can have full access to your system. In most instances this access wi ...

Category:Security

A set of instructions, especially ones that can be implemented on a computer, for a procedure that can manipulate data. Cryptographic algorithms are used to encrypt sensitive data files, to encrypt and decrypt messages, and to digitally sign documents.

Category:Security

Anti-Spyware products are designed to locate and remove spyware from your computer. Since 'spyware' itself is a fairly loose term, anti-spyware products are often also effective against Trojans and worms. They are not generally very effective against viru ...

Category:Security

Public Key Cryptography is also known as asymmetric cryptography. Symmetric cryptography uses the same key for both encryption and decryption. Asymmetric cryptography uses different (but related) keys for encryption and decryption. It is also called publi ...

Category:Security

A secure system requires that all users must identify themselves before they can perform any other system action. Authentication is the process of establishing the validity of the user attempting to gain access, and is thus a basic component of access con ...

Category:Security

Microsoft's cabinet file signing technology to provide protection against dangers such as ActiveX misuse. Authenticode comes into play when applications are signed by the authors and placed in cabinet (CAB) files. These are then check-summed as to their c ...

Category:Security

Authorization is permission for a subject to access an object. In practice, only authorized users should be allowed access to specific data or resources. The details of who is authorized to do what is usually maintained in special access control lists (AC ...

Category:Security

One of the four fundamental requirements of information security, availability is the requirement that information and/or services be available to an authorized user on demand. The maintenance of availability is one of the prime functions of a security sy ...

Category:Security

In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. There are several types of biometric identification schemes: * face: the analysis of facial chara ...

Category:Security

A 'block' is an amount of data treated as a single unit. A block cipher is a cipher that requires the accumulation of a complete block before transformation can be completed.

Category:Security

What's your e-authentication method?

Go to top