Single-Sign-On Case Study

Improved Essays
Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented.
In an enterprise where Single-Sign-On has not been implemented, some problems employees may experience are:
1. In the healthcare industry, it could be booming with single-sign-on. If doctor were to need to sign-on to a database to access a patient’s files, he/she would also have to access x-rays, and other data that would be on a different application. Lack of having a single-sign-on for all that would be a riskto life-saving. Not only that, but much time is wasted.
2. Users will need to manage a whole lot of different passwords in order to access a large number of systems.
3. It can be very difficult to add increased
…show more content…
Smart cards rely on two-factor authentication. The smart card can be locked, and only the user who possesses the card and knows the correct personal identification number (PIN) can unlock it. The Kerberos-based SSO on the other hand does not require password from the user.
The smart card also has improved performance. Some sophisticated smart cards contain hardware-based encryption chips that can provide better throughput than software-based implementations. A smart card can also store a username while the Kerberos-based SSO cannot store the username.
The smartcard can be access from any workstation. Users log in by inserting the smart card in a hardware device that reads the card and prompts the user for whatever authentication information the card requires, such as a PIN. Once the user enters the correct authentication information, the smart card generates and enters whatever other authentication information is required.Kerberos-based SSO on the other hand can just be accessed from just one

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1110 Case Study

    • 950 Words
    • 4 Pages

    External Parts: Case - This houses all of the hardware of the computer ranging from the motherboard to the hard drive. Universal Serial Bus Flash Drive (USB Flash Drive) -…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 4

    • 239 Words
    • 1 Pages

    What are the security systems used other than Doctor Authentication? Structure Issues: 1. Missing: Some elaboration on any similar previous work that tried to use a similar method of analysis. 2. Fig.…

    • 239 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Passwords cannot be stored in an easy to find location and should never be shared; not even with family members. • Employees that need to use private equipment and connect to the company network must meet company’s security policy for owned equipment remote access and be aware of the risks of exposing company information and its consequences. • Hosts using company or private computer to connect to CRI internal networks via remote access must be protected by using the most recent and powerful anti-virus…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Public Key Infrastructure is a comprehensive subject that is constantly developing to meet high growing demands of the business word. PKI is one of the most effective way for securing networks. The encrypted information that is sent is delivered using a public key. An individual is able to provide the public key to the sender, or the key can be retrieved from the directory from where it was published. PKI works in concert of other security mechanisms to help protect vital information (Weise, 2001).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    SWOT Analysis: Gamestop

    • 2103 Words
    • 8 Pages

    Apparent Strategy GameStop main focus as a company is video games. This has been their focus since the company has started. The video game industry has been big since the 21st century. GameStop has the leading companies in video game retailing.…

    • 2103 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Workstation Security Policy A workstation policy provides standards for access to information inside the facility in a controlled manner, respecting guidelines set by the Health Insurance Portability and Accountability Act (HIPPA). The purpose of this policy is to provide guidelines to properly ensure workstation security within healthcare companies. Workstation security policy ensures the security of information on the workstation and information accessed by the workstation. Additionally, this policy provides guidelines on how to ensure that the requirements of HIPPA are met.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    A Risk Assessment Plan plays a big role in any company, whether it is big or small company. The risk assessment will help identify the vulnerabilities and threats to the Wells Fargo IT resources. Which will help determine the impact of those vulnerabilities, threats, and unauthorized access. Having some knowledge of what type of risks expect will help mitigate them faster. There are a several steps needed for a good risk assessment plan, which will essentially help the company be in compliance with FISMA and other federal laws.…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    They amuse data gathers by cookies and different innovations, such as insensitive information (Apple, 2014). Besides, Apple 's map services, give the precision into its GPS administrations (Staff, 2015). IOS gadgets gives new security viewpoints, but they have easy to utilize. Numerous angles are empowered naturally, along these lines IT divisions don 't require to execute wide designs. Most security aspects as gadget encryption are not configurable, subsequently clients can 't…

    • 905 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Lock And Key Importance

    • 826 Words
    • 4 Pages

    The efficiency of the lock and keys is that it’s very easy to use for the public and it has a good sense of security yet there is a flaw due to it could hacked into by lock picking. There is many types of the lock and keys, which allows variety for the consumers when they consider buying these types of products. Much like the lock and key, the smart lock is also efficient due to it being on your phone which allows people to carry less items and there is also the possibility of the smart locks malfunctioning so I would say that the normal lock and key system is a better option for people. The smart lock can also be an issue to those who don’t know much about technology but have the system built into their new house or apartment.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Finally, 3.4 gives a complete description of the Mastercard PayPass specifications. 3.1 EMV Contactless Specification Documents The EMV Contactless specification is defined by the EMV Contactless books [21-22], kernel specifications [23-24], additional documents have been published by Maestro [25] and also to some extent the EMV Contact book [26-27]. Figure 3.1 gives an overview of all the EMV book and…

    • 907 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Versatile Payment, which can also be called as portable cash, portable cash exchange, and portable wallet alludes to the installment benefits that are utilized from or by means of a cell phone. Or maybe paying with money, check or charge cards, a purchaser uses a cell phone, a tablet or some other electronic gadgets to pay for an extensive variety of administrations. As of late, because of the progressions in innovation and furthermore the impacts of demonetization have reinforced the utilization of versatile installments. Portable installment frameworks are embraced everywhere throughout the world in different distinctive ways.…

    • 1696 Words
    • 7 Pages
    Improved Essays