In: Computer Science
In this week's reading we looked at accounts, identity, authentication, and account recovery. There is an old adage that says, "You can never be too safe. When it comes to the digital world, it's very true. Cyber hackers and hijackers are lurking everywhere to steal digital information. And while it's a piece of cake for them to get passwords and other sensitive information, for the rest of us, keeping track of login information is a hassle especially since everything needs its own password. It's too much and eventually passwords get forgotten.
The week's reading mentioned various methods of approach to account recovery. In your own words state what approach(s) you believe are the best approaches for account recovery, and how you would apply the approach in an enterprise setting. Please state your answer in a 1-2 page paper in APA format.
Hi, Please find the solution below and rate the answer.
Recently about a couple of years ago, about the giant lynda.com where we hear that sensitive username and password information of several accounts were stolen by hackers. At least from the last 2 years we have heart similar news some number of times.
It becomes very important for organisations to make sure that an authorised user is only operating the account, since those users have signed some terms with that organisation, and in turn provide services to them. If an unauthorised person, gets his hand on such information, it can be hazardous for the organisation.
First let’s discuss the information which is very integral to every individual and the level of the integrity. So the user has following information which is integral to him.
Some of the most integral things to a person would definitely be face recognition, finger print scan and a retina scan, since duplication and reproducing these, would be very difficult. Even if some hackers are able to steal some account information where the login is using a username a password and a finger print, breaking into the system would get very difficult. Of course, there would be lot of expense for such an arrangement, but depending on the sensitivity of data and the level of the hazard, investing in these might be worthwhile.
The organisation also has a choice of requiring the authentication of an employee’s team lead authentication along with the authentication of the particular individual who has to login and access important information of the company. In this way, there would be more confidence in the organisation about the integrity of the data/account access.
So to conclude account recovery can be done, by choosing which level of integrity of the employee is required to verify the authorisation of the account access and application of the same, would give greater confidence to the organisation, about its data and access to it.
--------------
Feel free to expand on the above, there is a lot of content I have included to expand on. Thanks