To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Multi-party authorization

From Wikipedia, the free encyclopedia

Multi-party authorization (MPA) is a process to protect a telecommunications network, data center or industrial control system from undesirable acts by a malicious insider or inexperienced technician acting alone. MPA requires that a second authorized user approve an action before it is allowed to take place. This pro-actively protects data or systems from an undesirable act.

YouTube Encyclopedic

  • 1/3
    Views:
    451
    1 821
    32 220
  • VoIP Business Telephone Systems in Jackson, TN | Weaver Communications
  • Undergraduate and Postgraduate degree with English Teaching Medium at Shenyang Aerospace University
  • Deathmatch: iPhone vs Android

Transcription

Meet John. John is a local business owner. John's business is really growing. He has hired several new employees to improve the company workflow. But now John has discovered that he has a problem. Customer communication is becoming a real challenge for John's company. Even though John is making a profit he knows that he isn't reaching his maximum potential in the customer service department. How can John maintain a solid reputation as a company when his customers are having difficulty reaching his office due to a distorted and saturated call flow? The solution:Weaver Communications. A local provider of voice, data, audio and visual networking solutions for businesses. With Weaver, John discovered many opportunities to greatly enhance his call flow. And it was much easier than he could have imagined. With a simple approach to a sophisticated need, Weaver Communications was able to train his employees on how to get the maximum benefit from the company's investment. With Weaver's dedication to serving local businesses John knew that he had found a company he could rely on when he needed them most. John appreciated his experience with Weaver as they treated him as a business partner rather than another typical customer Now John is happy... and his customers are happy. John's company now serves his customers at a level he always imagined. What are you waiting for? Call Weaver Communications today for a free consultation and see how they can help your business go to the next level.

Architecture

Existing methods to protect data and systems from the malicious insider include auditing, job rotation and separation of duties. Auditing is a reactive method meant to discover who did what after the fact. Job rotation and separation of duties are limiting techniques meant to minimize prolonged access to sensitive data or systems in order to limit undesirable acts. In contrast, MPA is a pro-active solution.

An advantage MPA has over other methods to protect from undesirable acts by a malicious insider or inexperienced operator is that MPA is pro-active and prevents data or systems from compromise by a single entity acting alone. MPA prevents the initial undesirable act rather than dealing with a breach or compromise after the fact.

Application

Multi-party authorization technology can secure the most vulnerable and sensitive activities and data sources from attack by a compromised insider acting alone. It is somewhat analogous to weapons systems that require two individuals to turn two different keys in order to enable the system. One person cannot do it alone. Another example is to consider access to a lock box in a bank. That access requires multiple parties, one the lock box owner and another a bank official. Both individuals act together to access the lock box, while neither could do so alone. MPA, in like manner, ensures that a second set of eyes reviews and approves of activity involving critical or sensitive data or systems before the action takes place.

Multi-party authorization is suitable for a wide variety of applications. MPA can be implemented to protect any type of sensitive data in electronic form or any activity within a network infrastructure or computerized control system. An electronic health record is an example of a data record that could be protected by MPA. Multi-party authorization provides pro-active protection from undesirable acts by the inexperienced technician or malicious insider.

References

US Patent 7,519,826, issued: April 14, 2009 for "Near Real Time Multi-Party Task Authorization Access Control"

Further reading

IT BusinessEdge, Nov 25, 2009 "Protecting From the Malicious Insider: Multi Party Authorization"

This page was last edited on 18 May 2022, at 09:22
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.