Password Management: High-impact Strategies - What You Need to Know : Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

ISBN
9781743045015
$39.95
Author Roebuck, Kevin
Format Paperback
Details
  • Active Record
  • Individual Title
  • Yes
There are several forms of software used to help users or organizations better manage passwords: Intended for use by a single user: Password manager software is used by individuals to organize and encrypt many personal passwords. This is also referred to as a password wallet. Intended for use by a multiple users/groups of users: Password synchronization software is used by organizations to arrange for different passwords, on different systems, to have the same value when they belong to the same person. Self-service password reset software enables users who forgot their password or triggered an intruder lockout to authenticate using another mechanism and resolve their own problem, without calling an IT help desk. Enterprise Single signon software monitors applications launched by a user and automatically populates login IDs and passwords. Web single signon software intercepts user access to web applications and either inserts authentication information into the HTTP(S) stream or redirects the user to a separate page, where the user is authenticated and directed back to the original URL. Privileged password management software. This book is your ultimate resource for Password Management. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Password Management right away, covering: Password management, Password, 1dl, 2D Key, ATM SafetyPIN software, Canonical account, Challenge-Handshake Authentication Protocol, Challenge-response authentication, Cognitive password, Default password, Diceware, Draw a Secret, Duress code, LM hash, Munged password, One-time password, OpenID, OTPW, Partial Password, Passmap, PassPattern system, Passphrase, Password authentication protocol, Password cracking, Password fatigue, Password length parameter, Password manager, Password notification e-mail, Password policy, Password strength, Password synchronization, Password-authenticated key agreement, PBKDF2, Personal identification number, Pre-shared key, Privileged password management, Random password generator, Risk-based authentication, S/KEY, Secure Password Authentication, Secure Remote Password protocol, SecurID, Self-service password reset, Shadow password, Single sign-on, Swordfish (password), Windows credentials, Zero-knowledge password proof, Account aggregation, Billeo, Bitser software, Factotum (software), GNOME Keyring, IVault, KeePass, Keychain (Mac OS), KWallet, KYPS, LastPass, Mitto, Password Safe, Roboform, Seahorse (software), Sticky Password Manager, Identity management, Windows CardSpace, CCSO Nameserver, Certification on demand, Common Indexing Protocol, Credential, Digital identity, Directory information tree, Directory System Agent, Electronic authentication, Federated identity, Federated identity management, Federated Naming Service, Future of Identity in the Information Society, Group (computing), Identity access management, Identity as a service, Identity assurance, Identity Assurance Framework, Identity change, Identity Governance Framework, Identity intelligence, Identity management system, Identity Management Theory, Identity metasystem, Identity score, Information Card, Information Card Foundation, Liberty Alliance, Scott Mitic, Mobile identity management, Mobile signature, Mobile Signature Roaming, Multi-master replication, Novell Storage Manager, Online identity management, Oracle Identity Management, Organizational Unit, Privacy, Privacy-enhancing technologies, Profiling practices, Service Provisioning Markup Language, Trombinoscope, User profile...and much more This book explains in-depth the real drivers and workings of Password Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Password Management with the objectivity of experienced professionals.