Risks Of Single Sign On (Sso) Password Systems

2881 words - 12 pages

The use of the internet and internet related technology is expanding and growing. Many businesses, and institutions such as schools, hospitals, and hotels are incorporating the use of the internet in almost all their functions. It would be important at this point to define the term internet, which can be referred to as a collection of networks that are particularly used instructions known as Transmission Control Protocol over Internet Protocol (TCP/IP) to communicate. (Stroud, 29-32). It has also been defined as a wide set of networks that are not dependent, and are interconnected to give it’s the appearance of a single and uniformed network." (National Research Council, 54)
The internet has become an integral part of the lives of many individuals all around the globe. Internet usage in the world has been accelerated by the ease brought bout in its usage. The internet provides vast amount of information at just a click of a button. The use of the internet has grown to become a delivery mechanism for massive amounts of multimedia information to a global audience. It is used in business transactions, with the use of the internet to do business being referred to as e-commerce. (Stroud, 60) E-commerce is increasingly expanding, as well as the materialization of new forms of networking, and the possibility of the mush low-priced terascale computing. (Standage, T. 165-180)
The internet has become more widespread than ever in history. As at June 30th the Internet world statistics stood at approximately 2.5 billion users representing 34% of the whole the world’s population. A new report by UN’s international Telecommunications Union revealed the extensive growth in the internet. According to the study the body revealed that by 2014 the number may be as high as 3 billion by the end 2014 (Danah M. Boyd, 2010).
The internet's architecture was developed over thirty years ago has greatly improved based on the wide network technologies it now supports as well as the immense variety of applications it currently supports. (Anderson, 11)
The ITU explained that the massive expected growth has increased with the increase in Internet functions and products in the internet. More innovative ways of using the internet have accelerated the growth of users. One recent platform that has taken the world by storm are the Social network services. A social network service is a web-based service that allows individuals to do the following.
• Construct a public or semi-public profile within a bounded system
• Articulate a list of other users with whom they share a connection
• View and traverse their list of connections and those made by others within the system.
Since their introduction, social network sites (SNSs) such as MySpace, Facebook, Cyworld, and Bebo have attracted millions of users, many of whom have integrated these sites into their daily practices (Danah M. Boyd, 2010). What makes social network sites unique is not that they allow...

Find Another Essay On Risks of Single Sign-on (SSO) Password Systems

Sign Language in Development: History of American Sign language based on the article "Arbitrariness and Iconicity: Historical Change in American Sign Language" by Nancy Frishberg

2556 words - 10 pages IntroductionThis report is based on the article “Arbitrariness and Iconicity: Historical Change in American Sign Language” (Language 51, 1975) by Nancy Frishberg. First we will summarise Frishberg’s article and explain her objectives. In the second part we will elaborate over four different words and their reduction of iconicity over the years. The article explicitly describes the changes up till 1975 and the changes after this

Effects of Single Parent Adoption on a Child

1242 words - 5 pages The modern society of the United States has recently exhibited a rise in the numbers of single parent adoption. The most extreme increase lies in the Hollywood sector of social media that can be commonly observed on nationwide celebrity news channels such as TMZ, E-TV, and Access Hollywood. The big question brought forth to most tabloids and dinner tables across the country inquires whether or not these adoptions are morally acceptable and if

The Effects of a Single Parent Home on Teens

3988 words - 16 pages reasons why the single parent family exists in the community of Hopewell, Hanover as the family should be to socialize children into adult personalities which are relevant for life and also for psychological and emotional support. However the researcher became involved in this topic as the researcher wanted to find out the real reasons behind single parent families. It is the hope of the researcher that by researching this topic on single parent

Number of Single-sex Schools on the Decline

742 words - 3 pages , researchers examined classroom participation at Goucher College beginning the first year after the school had become a coeducational institution. However, following their data collection that began in 1987, no additional research on the transition to coeducation has emerged. Although studies on this topic may seem to apply to only the handful of institutions transitioning from single-sex to coeducation, findings from this research are also

The Impact of Single-Parent Families on College Student’s Education

1816 words - 7 pages on student’s educaton (Alika 2012; Garg, et al, 2007). We also consider the influence of parent’s educational history and financial situation on student’s education (Garg et al, 2007; Pong et al, 2003, Hamden-Thompson, 2013). Many studies have found that students from single parent homes have on average, a low overall educational performance in many areas. Surveys showed that students from single parent families in elementary school scored

Effect of Process Parametrs on Vesicular Systems

1270 words - 6 pages The Vesicular carrier based drug delivery systems are a recent breakthrough to achieve target specificity and minimization of adverse effects associated with drug. Inspite of such novelty associated, carrier systems suffer from drawback like non-uniformity in size. The present study is based on determination of optimum process conditions to obtain vesicles of uniform size carrying drug Aceclofenac. The results indicate a strong influence of

Summary, Discussion and Evaluation of the article 'Capacity of bottle-nosed dolphins for generalization based on a relative sign'

2400 words - 10 pages maintain and recall representations of recent actions can reveal the flexibility and specificity of animals' short term representations of those actions and can further elucidate the influence that internal and external factors have on animals' actions'. In general the discussion section fits the traditional format; however, some points such as identifying needed next steps in research on the problem are not clearly addressed.Sources:Capacity of bottle-nosed dolphins for generalization based on a relative sign, Neuroscience and Behavioral Physiology, Volume 21, Number 2 / March, 1991

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1214 words - 5 pages applications and data Layers of company infrastructure must be known in order to identify the physical and virtual servers running critical applications. Data storage devices must also be identified as they are vulnerable to attacks (Orde & Poarch 2012). Applications such as Ubuntu Server 7.1, Apache version 2.2.12 that is running on company systems must be known. Rouse (2006) refers to this step as assigning relative levels of importance to the

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1339 words - 6 pages 3. REPORT OF IDENTIFIED RISKS 3.1 Identification of risks in the system and/or security vulnerabilities Risks or security vulnerabilities identified in Dynamic company systems include: 3.1.1 Physical location of web servers is easily accessible by employees The company has insufficient physical controls protecting equipment as the location of web servers are easily accessible by employees. According to Landoll (2011:312) humans pose a

Vulnerability assessment of the company system and recommendations on measures to mitigate or eliminate potential risks

1167 words - 5 pages 2.3 Vulnerability assessment tools Vulnerability assessment tools are a requirement for a successful vulnerability assessment as indicated in item 2.2 above (Perry nd). Security assessment tools detect and stop malware and any other attempt to crack computer systems. They are categorised into network security assessment tools and Web security assessment tools. Network vulnerability scanning focus on both sides of the firewall, within and

My paper discusses how applied information management systems have a variety of risks and the different types of security you can get

2007 words - 8 pages 1) Chapter four, or Personal, Legal, Ethical, and Organizational Issues of Information Systems, mainly touches on different information technologies and organizational issues. There are many risks that are associated with information technologies, which "can be misused to invade users' privacy and commit computer crimes" (57). The first way privacy can be invaded is by using cookies, which "are small text files with a unique ID tag that

Similar Essays

Single Sign On: The One Password Revolution

1807 words - 7 pages , that is what we are going to examine. SSO 4 Single Sign-On, the One Password Revolution It is 6:00 in the morning, when Bob awoke to the sound of his alarm clock. He springs from his bed and leaps into the shower. Bob worries that his first day at the office may not go the way he hopes. You see, Bob graduated in the summer of 1989 with a Business degree, and is anxious to put all that knowledge he has

Compliance Systems: Reducing The Risks Of Customers

1606 words - 6 pages for the protection of others. Secondly, compliance systems and policies are designed to reduce the risk of loss of the consumer/customer/client. As the consumer/client/customer is at risk, government regulations are made to protect the consumer and the corporations must follow the guidelines. Most often the laws are not put in place until after an incident has occurred. Finally, becoming compliant is conforming to guidelines and procedures that

A Survey On The Limitations Of Graphical Password Scheme And The Mitigation Of Proposed System

1644 words - 7 pages problems with traditional textual passwords. In this approach they determine the usability effects of modifying the system parameters to increase the level of security in click based graphical password systems. The usability tests have used configurations resulting in the password spaces smaller than that of the common textual passwords. They explored the effects of number of click points and the image size on user behavior resulting in the clustering

The Effect Of Musculoskeletal Disorders On Sign Language Interpreters

909 words - 4 pages and wrists, “found that 59% of the 184 respondents to their survey experienced hand or wrist problems (Johnson).” Being an interpreter can lead to many physical problems. The repetitive movements and increased amount of time spent signing can take a toll on your body and cause a lot of damage. In order to avoid cumulative trauma disorders it is important that interpreters take care of themselves. When you are first learning to sign you need to