Saturday, September 7, 2019
Case Study in Comuter Security Essay Example | Topics and Well Written Essays - 2000 words
Case Study in Comuter Security - Essay Example It provides consistent approaches for the applications that could be running on the organizations or within the internet cloud. Advantages and disadvantages STS can simplify authentication logic especially for every individual software applications. It makes it possible for applications to identify certain aspects about the users even without interrogating the user. It simplifies authentication processes for user. The major disadvantage is confusion in the term and concepts. It requires substantial skills to use the application and it is costly to install and use. Claims-based identity could be used by the Metropolitan Police Service as a way of applications for acquiring identity information required for every individual working for the police service within the area. The administrators could establish and acquire all MPS usersââ¬â¢ identity information. MPS could find this technology useful since it provides an approach, which is consistent for the applications that are running on the Metropolitan Police Service premises as well as in the internet cloud. ... s The Role-Based Access Control (RBAC) is used in managing multiple identities in different roles within the police service Advantages and disadvantages It is advantageous in that it allows role associations that can be created when new operations are started and old associations are done away with. It is also advantageous in terms of its ability to control privileges at an individual level. The technology is technical and costly to adopt. Application The Metropolitan Police Services can utilize this technology for a successful operation of its activities without comprising the security of sensitive information in the police service. Recommendation I would recommend the use of the claims-based identity technology because it has more potential grounds in preventing multiple identities. It has potential to make authentication logic simpler for every individual software application. In this case, the applications do not require the provision of account creation mechanisms, password crea tion, or even reset. Again, there is hardly any need to interrogate user to determine certain information since the technology can establish certain aspects about the user. Answer to Question 2 Role In the world of information technology, there is an important need to strengthen user authentication in order to keep hackers and such kind of people at bay and there different ways to validate the identity of a user which do have distinct levels of security (Douligeris 2007, p.173). The single factor authentication involves simple identifications like a badge that is used to access a door or a building that is potentially fairly secure but may be prone to failures such as problems of passwords. Biometrics is highly used as a secure and very convenient authentication tool. This tool can hardly
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.