Wednesday, April 17, 2019

Case Study in Comuter Security Essay Example | Topics and Well Written Essays - 2000 words

Case Study in Comuter Security - Essay typefaceIt provides consistent approaches for the applications that could be running on the organizations or within the internet cloud. Advantages and disadvantages STS keister simplify enfranchisement logic especially for every individual bundle applications. It makes it possible for applications to identify certain aspects about the users up to now without interrogating the user. It simplifies authentication processes for user. The major disadvantage is confusion in the term and concepts. It requires substantial skills to use the application and it is pricey to install and use. Claims-based identicalness could be used by the Metropolitan law Service as a way of applications for acquiring identity instruction required for every individual working for the police serving within the area. The administrators could establish and acquire all MPS users identity information. MPS could find this engineering science utilitarian since it provid es an approach, which is consistent for the applications that are running on the Metropolitan Police Service premises as hearty as in the internet cloud. ... s The Role-Based Access Control (RBAC) is used in managing multiple identities in different roles within the police service Advantages and disadvantages It is advantageous in that it allows role associations that can be created when new-fangled operations are started and old associations are done away with. It is also advantageous in footing of its ability to control privileges at an individual level. The technology is technical and costly to adopt. Application The Metropolitan Police Services can utilize this technology for a successful operation of its activities without comprising the security of sensitive information in the police service. Recommendation I would recommend the use of the claims-based identity technology because it has more latent grounds in pr fifty-fiftyting multiple identities. It has potential to make authentication logic round-eyedr for every individual software application. In this case, the applications do not require the provision of account creation mechanisms, password creation, or even reset. Again, there is hardly any need to interrogate user to determine certain information since the technology can establish certain aspects about the user. Answer to Question 2 Role In the cosmos of information technology, there is an important need to strengthen user authentication in order to stop hackers and such kind of people at bay and there different ways to validate the identity of a user which do have distinct levels of security (Douligeris 2007, p.173). The single factor authentication involves simple identifications like a badge that is used to access a door or a building that is potentially fairly secure but may be prone to failures such as problems of passwords. biometrics is highly used as a secure and very convenient authentication tool. This tool can hardly

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.