Free Samples
ISSC411 Application Security
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
ISSC411 Application Security
0 Download4 Pages / 1,000 Words
Course Code: ISSC411
University: American Military University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United States
Question:
State the topic you are attempting to coverState the issues involvedState why we should be concerned with resolving whatever issues are involvedState how answering the issues will help usState the implications and consequences of dealing with or resolving the issues involvedIdentify who has tried to answer the question before by doing the following:How each of the sources presents and deals with the subjectExplain how each source presents and deals with its findings or resultsExplain the relevancy of each source to your topicState what you learned from each of your sourcesState in what way(s) each source contributes to answering your issues
Discussion: State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issueState what questions about your topic you still have that your sources may not have answered
Answer:
Introduction:
Identity management comprises of creating a remote user’s or system’s identity, managing user access to services through access control and keeping user’s identity details (Mahalle et al., 2013). Proper implementation of such system is complex, as it has some drawbacks that must be addressed before considering the system as privacy friendly, secure and usable. This paper provides a literature review about identity management and access control systems, followed by the discussion on tackling the potential issues that arises in systems and finally in concludes mention the purpose of such systems.
Review of the Literature:
Several studies have given significance to the usability, security and privacy issues of system of identity management, each focusing on particular issues. One important challenging research tasks is building a secured and privacy friendly identity management system with good usability properties.
Traditional privacy-preserving identity management system has user consent mechanism for end users personal data management for accessing services, by providing user consent mechanisms. Technical research recommends usable privacy enhancing solutions. According to Klevjer, Varmedal & Jøsang, 2013), there is a proposed scheme in which a personal authentication device claims to provide security in single log-on method and safeguard against phishing attacks. During implementing the identity management system, organizations should agree on what are the requirement for business needs and the review should include hardwares, softwares, data sources, workflows, policies, procedures and it must include all departments.
In order to handle security information, identity management systems enforce different kinds of access rights through different techniques and methods. However, there remain several vulnerabilities. These access rights are associated with different risks and threats and hence presume different trust relationships among end-users, relying parties and identity providers (Connelly et al., 2014). However, both system designers and users are ignorant of this difference in access rights, which lead to impermissible risks.
Although several identity management systems are being designed from the user perspective, still most of such systems have important usability issues. The identity system must let a user to independently generate, use and manage his or her identity, regardless of user’s current site as well as current device in use.
Discussion:
Current research in identity management have several challenges relating the balance among privacy, security, usability factors. The solution for mutual authentication is still to be developed where users have to provide credentials and there will be provision such that identity providers and relying parties are also authenticated to the users (Torres, Nogueira & Pujolle, 2013). Clearly, identity management has a role in delivering effective application security. Identity management systems should be able to differentiate between the lifespan of an identity with that of claims obtained from the same identity. These systems should have provision to remove full or a part of outdated identities and to refute the outdated claims.
All the contemporary identity management systems have provision for user authentication still there is no way for the user to authenticate the identity party or the relying party. However, by authenticating the identity party or the relying party users will have the provision to prevent phishing attacks (Sicari et al., 2015). Hence, identity management systems must incorporate mutual authentication, in such a manner that the user does not have to install any special software or to use one and the same device each of the time. In addition, one use of identity management systems is enforcing ownership of a resource. One key example of this is online banking system, and to a marginal extent chat and email accounts, social network and blog accounts. Illegitmate access of user’s bank account will result in direct financial loss. While access to user’s electronic mail and chat account or other systems can allow a criminal to take user’s identity, which may hurt users in many ways (Mahmoud et al., 2015). Here, the risk associated with identity management rests totally with the user.
It is notable here that access permission to business applications along with their associated data bears greater risk in particular since besides having revenue loss, there is possibility of enormous financial damage as the data that is often confidential becomes public. Similarly, different risk level are associated regarding access permission to an email account and permitting access to a bank account.
Conclusion:
Thus, we find that identity management deals with the policies and techniques related to identification along with authentication process through access management and user profile management. The primary requirement for both relying parties and end-users and is that identity management systems that are spread across various organisations must be completely secure, user friendly and maintain privacy. However, any modern system of identity management have not been able to fulfil this completely. Finally, it draws conclusion that the objective of identity management and access control is to ensure that users can access only the resources such as applications and data they need.
References:
Connelly, M., Kanchinadham, S., Maharana, B., Rubin, L., Cook, M. J., Tobin, J., … & Subramaniam, B. (2014). U.S. Patent No. 8,842,815. Washington, DC: U.S. Patent and Trademark Office.
Klevjer, H., Varmedal, K. A., & Jøsang, A. (2013, April). Extended HTTP digest access authentication. In IFIP Working Conference on Policies and Research in Identity Management(pp. 83-96). Springer, Berlin, Heidelberg.
Mahalle, P. N., Anggorojati, B., Prasad, N. R., & Prasad, R. (2013). Identity authentication and capability based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility, 1(4), 309-348.
Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status, challenges and prospective measures. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 336-341). IEEE.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, 146-164.
Torres, J., Nogueira, M., & Pujolle, G. (2013). A survey on identity management for the future network. IEEE Communications Surveys & Tutorials, 15(2), 787-802.
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 4 pages
PAY 3 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2021). Application Security. Retrieved from https://myassignmenthelp.com/free-samples/issc411-application-security/management-comprises-of-creating.html.
“Application Security.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/issc411-application-security/management-comprises-of-creating.html.
My Assignment Help (2021) Application Security [Online]. Available from: https://myassignmenthelp.com/free-samples/issc411-application-security/management-comprises-of-creating.html[Accessed 18 December 2021].
My Assignment Help. ‘Application Security’ (My Assignment Help, 2021)
My Assignment Help. Application Security [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/issc411-application-security/management-comprises-of-creating.html.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
If you do not know how to write a term paper, simply hire us and receive exemplary solutions on the go. Our term paper writing service is effective, affordable and deadline-oriented. We will also help you with interesting topics to research for your term paper assignment. In addition to it, we are committed to sending across 100% original papers. Wondering how? We use advanced plagiarism checkers to look through each and every critical plagiarism issues. So, you need to check plagiarism online for your term papers. We shall send across comprehensive solutions on time.
Latest Management Samples
div#loaddata .card img {max-width: 100%;
}
MPM755 Building Success In Commerce
Download :
0 | Pages :
9
Course Code: MPM755
University: Deakin University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More
SNM660 Evidence Based Practice
Download :
0 | Pages :
8
Course Code: SNM660
University: The University Of Sheffield
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration
BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20
Course Code: BSBHRM513
University: Tafe NSW
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More
MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5
Course Code: MKT2031
University: University Of Northampton
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration
MN506 System Management
Download :
0 | Pages :
7
Course Code: MN506
University: Melbourne Institute Of Technology
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology
Next