User talk:Palmore11

Multi-Party Authorization

Multi-Party Authorization requires a second authorized user approve of an action before it is allowed to take place in the network or control system. MPA implements a second key in the system, requiring a second authenticated entity approve of certain activity before that action can take place. Protecting networks or control systems from the malicious insider can be accomplished with the use of Multi-Party Authorization (MPA).

Currently, the most common ways employed by networks or control systems to provide protection from a compromised network insider, if any protection is put in place at all, are auditing for accountability, separation of duties, and job rotation.