.

Saturday, June 8, 2019

Case Study in Comuter Security Essay Example | Topics and Well Written Essays - 2000 words

Case Study in Comuter Security - Essay ExampleIt provides consistent approaches for the applications that could be running on the organizations or at heart the internet cloud. Advantages and disadvantages STS can simplify credentials logic especially for every individual software applications. It makes it possible for applications to identify certain aspects about the practicers even without interrogating the drug user. It simplifies authentication processes for user. The major disadvantage is confusion in the term and concepts. It requires substantial skills to use the application and it is costly to install and use. Claims-based identity could be used by the metropolitan patrol Service as a way of applications for acquiring identity study required for every individual working for the police service within the area. The administrators could establish and acquire all MPS users identity information. MPS could find this technology useful since it provides an approach, which is c onsistent for the applications that are running on the Metropolitan Police Service premises as well as in the internet cloud. ... s The Role-Based Access Control (RBAC) is used in managing multiple identities in opposite roles within the police service Advantages and disadvantages It is advantageous in that it allows role associations that can be created when new operations are started and old associations are done by with. It is also advantageous in terms of its ability to control privileges at an individual level. The technology is technical and costly to adopt. Application The Metropolitan Police function can utilize this technology for a successful operation of its activities without comprising the security of sensitive information in the police service. Recommendation I would recommend the use of the claims-based identity technology because it has more potential grounds in preventing multiple identities. It has potential to make authentication logic simpler for every individ ual software application. In this case, the applications do not require the provision of account creation mechanisms, password creation, or even reset. Again, on that point is just any need to interrogate user to determine certain information since the technology can establish certain aspects about the user. Answer to Question 2 Role In the world of information technology, there is an important need to strengthen user authentication in order to keep hackers and such kind of people at bay and there different ways to validate the identity of a user which do have distinct levels of security (Douligeris 2007, p.173). The single factor authentication involves simple identifications same a badge that is used to access a door or a building that is potentially fairly secure but may be prone to failures such as problems of passwords. Biometrics is highly used as a secure and very convenient authentication tool. This tool can hardly

No comments:

Post a Comment