Design Philosophy
The premise was simple in that the existing authentication technologies were unsatisfactory and easy to compromise. No authentication technology can really provide its full and intended security benefits unless the computer and computer network are re-designed from the grounds up.
Oracle Adaptive Access Manager has two components, the strong Authentication-agnostic security component and the application-agnostic Risk component. One simple example of the Strong Authentication component is that a User can choose a personalized keypad and use mouse clicks to enter password to prevent passwords being stolen with key loggers and being phished or pharmed. The Risk Component analyzes the authentication and transaction data for abnormalities and anomalies in real-time to prevent fraud and also in off-line mode to identify and detect internet fraud.
Read more about this topic: Oracle Adaptive Access Manager
Famous quotes containing the words design and/or philosophy:
“Delay always breeds danger; and to protract a great design is often to ruin it.”
—Miguel De Cervantes (15471616)
“The philosophy of action for action, power for the sake of power, had become an established orthodoxy. Thou has conquered, O go-getting Babbitt.”
—Aldous Huxley (18941963)