Question

In: Computer Science

In this week's reading we looked at accounts, identity, authentication, and account recovery. There is an...

In this week's reading we looked at accounts, identity, authentication, and account recovery. There is an old adage that says, "You can never be too safe. When it comes to the digital world, it's very true. Cyber hackers and hijackers are lurking everywhere to steal digital information. And while it's a piece of cake for them to get passwords and other sensitive information, for the rest of us, keeping track of login information is a hassle especially since everything needs its own password. It's too much and eventually passwords get forgotten.

The week's reading mentioned various methods of approach to account recovery. In your own words state what approach(s) you believe are the best approaches for account recovery, and how you would apply the approach in an enterprise setting. Please state your answer in a 1-2 page paper in APA format.

Solutions

Expert Solution

Hi, Please find the solution below and rate the answer.

Recently about a couple of years ago, about the giant lynda.com where we hear that sensitive username and password information of several accounts were stolen by hackers. At least from the last 2 years we have heart similar news some number of times.

It becomes very important for organisations to make sure that an authorised user is only operating the account, since those users have signed some terms with that organisation, and in turn provide services to them. If an unauthorised person, gets his hand on such information, it can be hazardous for the organisation.

First let’s discuss the information which is very integral to every individual and the level of the integrity. So the user has following information which is integral to him.

  1. Password
  2. Phone
  3. Finger print
  4. Social security number.
  5. A combination of his address, phone number, date of birth and SSN encrypted.
  6. Combination of the above]
  7. Retina scan.
  8. Face recognition

Some of the most integral things to a person would definitely be face recognition, finger print scan and a retina scan, since duplication and reproducing these, would be very difficult. Even if some hackers are able to steal some account information where the login is using a username a password and a finger print, breaking into the system would get very difficult. Of course, there would be lot of expense for such an arrangement, but depending on the sensitivity of data and the level of the hazard, investing in these might be worthwhile.

The organisation also has a choice of requiring the authentication of an employee’s team lead authentication along with the authentication of the particular individual who has to login and access important information of the company. In this way, there would be more confidence in the organisation about the integrity of the data/account access.

So to conclude account recovery can be done, by choosing which level of integrity of the employee is required to verify the authorisation of the account access and application of the same, would give greater confidence to the organisation, about its data and access to it.

--------------

Feel free to expand on the above, there is a lot of content I have included to expand on. Thanks


Related Solutions

Authentication controls can be used to verify the identity of the person attempting to access an...
Authentication controls can be used to verify the identity of the person attempting to access an AIS. Identify the different types of authentication controls, the problems related to each control and how they can be used to provide effective protection from unauthorised access to an AIS.
During this week's reading we encountered a lot of new vocabulary. I usually don't quiz students...
During this week's reading we encountered a lot of new vocabulary. I usually don't quiz students on definitions of statistics vocabulary. I think it is much more useful for students to have an understanding of what terms mean rather than have them memorize definitions (which they soon forget). I want us to get in the practice of of putting meanings of new vocabulary in our own words, using our own examples to illustrate meanings to us. That will make these...
During this week's reading we encountered a lot of new vocabulary. I usually don't quiz students...
During this week's reading we encountered a lot of new vocabulary. I usually don't quiz students on definitions of statistics vocabulary. I think it is much more useful for students to have an understanding of what terms mean rather than have them memorize definitions (which they soon forget). I want us to get in the practice of of putting meanings of new vocabulary in our own words, using our own examples to illustrate meanings to us. That will make these...
This week's homework is based on the reading for chapter 12 and deals with Medicare fees...
This week's homework is based on the reading for chapter 12 and deals with Medicare fees and limiting charges. This case study is due by end of day Friday. Fill out the information below and determine the amount owed by the patient after the deductible has been met in the following situations. Provide the calculations used to determine your answers: A. Participating physician’s standard fee: $300.00 Allowed amount $200.00 Medicare pays 80% Patient or supplemental plan pays 20%: Provider adjustment...
In this discussion, you will apply the statistical concepts and techniques covered in this week's reading...
In this discussion, you will apply the statistical concepts and techniques covered in this week's reading about correlation coefficient and simple linear regression. A car rental company wants to evaluate the premise that heavier cars are less fuel efficient than lighter cars. In other words, the company expects that fuel efficiency (miles per gallon) and weight of the car (often measured in thousands of pounds) are correlated. Performing this analysis will help the company optimize its business model and charge...
​​​​MARKETING Consider this week's reading by Kotler, where he states that "... needs are not created...
​​​​MARKETING Consider this week's reading by Kotler, where he states that "... needs are not created by advertising, but are a basic part of human make-up" (1983, p.8) Do you agree with Kotler? Why or why not? You are required to think deeply about these questions, and form an opinion whether you either agree or disagree with Kotler. We don't mind whether you agree or disagree, it's all about how you justify your position.
First, review the "triple constraints" of IT Project Management as covered in this week's reading "What...
First, review the "triple constraints" of IT Project Management as covered in this week's reading "What is Project Management?" Note that there are more than 3 constraints discussed in the article. The illustration above from the article shows the author's interpretation of the "triple constraints." Group C: Please address the following 3 questions: Which of the triple constraints do you think is the most important for the project of implementing an enterprise hiring system for CIC? You should address from...
apply the statistical concepts and techniques covered in this week's reading about hypothesis testing for the...
apply the statistical concepts and techniques covered in this week's reading about hypothesis testing for the difference between two population proportions. In the previous week's discussion, you studied a manufacturing process at a factory that produces ball bearings for automotive manufacturers. The factory wanted to estimate the average diameter of a particular type of ball bearing to ensure that it was being manufactured to the factory's specifications. Recently, the factory began a new production line that is more efficient than...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent crime. The behaviors of 64 college students were compared with the behaviors of 56 nonstudents. One of the questions was "When asked to create a password, I have used either my mother's maiden name, or my pet's name, or my birth date, or the last four digits of my social security number, or a series of consecutive numbers." For the students, 25 agreed with...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent crime. The behaviors of 63 college students were compared with the behaviors of 58 non students. One of the questions was "When asked to create a password, I have used either my mother's maiden name, or my pet's name, or my birth date, or the last four digits of my social security number, or a series of consecutive numbers." For the students, 24 agreed...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT