Privileged access

Results: 256



#Item
131Cryptography / Cryptographic software / Password / Security token / Salt / S/KEY / Privileged password management / One-time password / Security / Computer security / Access control

Authenticating Mobile Device Users Through Image Selection1 Wayne Jansen The National Institute of Standards and Technology Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
132Computer security / Internet privacy / Phishing / Operating system / Malware / Password manager / Privileged password management / Security / Password / Access control

[removed]Administrative Procedure 141 SECURE TECHNOLOGY USE - MOBILE AND UNMANAGED DEVICES Background:

Add to Reading List

Source URL: www.eics.ab.ca

Language: English - Date: 2014-06-03 16:20:18
133Password / Cryptographic software / Password manager / Privileged password management / Security / Access control / Computer security

[Your District Name Here] Medicaid School Based Services Electronic Signature Verification This form is intended to record a physical copy of your signature in the event an audit is done of the documentation you have pr

Add to Reading List

Source URL: www.resa.net

Language: English - Date: 2013-08-19 15:57:51
134Security / Computer security / Federated identity / Privileged password management / Shadow password / Password / Cryptographic software / Access control

Employee Access Center (EAC) and Substitute Email

Add to Reading List

Source URL: www.carrollk12.org

Language: English - Date: 2014-06-05 13:22:02
135Security / Computer security / Federated identity / Privileged password management / Shadow password / Password / Cryptographic software / Access control

Employee Access Center (EAC) and Substitute Email

Add to Reading List

Source URL: www.carrollk12.org

Language: English - Date: 2014-05-08 14:41:27
136National security / Public safety / Computer network security / Data security / Password / Information security / Access control / Privileged password management / Information security audit / Security / Computer security / Crime prevention

University of Alaska Office of Information Technology  System Security Guidelines    The university computing environment is made up of a variety of operating systems, devices and  applications.

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2014-06-09 20:06:42
137Computer security / Midas / Default password / Cryptography / Privileged password management / Password strength / Security / Access control / Password

Passwords in MIDAS The MIDAS system requires two passwords for every MIDAS user. One password is to access the MIDAS web site and one is to run the MIDAS program on the PDR. Before new field crew personnel can use MIDAS

Add to Reading List

Source URL: www.fs.fed.us

Language: English - Date: 2010-06-18 08:03:44
138Password / User / HTTP Secure / Privileged password management / Security / Computing / Login

Division of Accountability Services (DAS) Secure Site Access Secure Site access is only available to district and school employees who require the information contained on the site as a part of their job. This informatio

Add to Reading List

Source URL: www.mi.gov

Language: English - Date: 2014-08-05 08:55:41
139Law / Data privacy / Attorney-client privilege / Privileged communication / Human rights / Legal professional privilege / Privacy Act / Freedom of information legislation / Privilege / Ethics / Privacy / Privacy law

NEWS RELEASE – August 24, 1999 Commissioner upholds Calgary Regional Health Authority’s decision to refuse access to part of lawyer’s statement of account Bob Clark, Information and Privacy Commissioner, publicly r

Add to Reading List

Source URL: www.oipc.ab.ca

Language: English - Date: 2009-03-27 10:57:48
140Password / Two-factor authentication / Cryptography / Privileged password management / Password manager / Security / Access control / Computer security

Responsible University Officer Chief Information Officer Responsible Office Information Technology Services Password Policy for

Add to Reading List

Source URL: its.unc.edu

Language: English - Date: 2014-08-14 10:38:41
UPDATE