Network Security

Read Complete Research Material

NETWORK SECURITY

Network Security

Network Security

Question 1: MPS staff have multiple identities associated with their different job roles. Why is a dedicated "solution" needed? Briefly and critically review leading edge approaches to role based authentication. What alternative solutions are applicable?

The implication of several approaches to be used in the enhancement of the identification Management and security assessments for The Metropolitan Police Services (MPS). The following are the elaboration of questions on the bases of the information provided in the case study, approaches that discussed includes are Identification Management, Biometric Authentication and Secure Data Transmission. Identity management is one of the most important elements when an IT infrastructure concerned. Some time it becomes very crucial because of growing employment rate that may be able to affect the budget. In the context of the case study, the furthermost confrontation is to build up the identity management infrastructure in order to make the security centralized.

As, it is prominent identity managements demand will increase with the increase of the employment. Consequently, the use of numerous identities as given an explanation in the case study will be very disordered in these circumstances. The MPS needed to implement the customized solution in order to develop a solitary identity depot to lend a help to eliminate the high cost. There is much more software like Access Control that is both hardware and software based control that gives the assistance to any organizations resources (Sun, 2009, pp.41-50). These controls will assist MPS working with the secure systems, assuring to provide the liberties to keep away from unnecessary permissions (Michael, 2008, pp. 361). The Access controls further divided into two sub parts that used and help manage the identities. They are the Access Management and Directory Services.

The Access Management is part of control that points on the controlling and streamlining access to the main applications and the data that are to be used as the source of the information; moreover, it also includes secure web services with the aptitude of single sign-on, and privilege enforcement. This will assist the MPS to grow on t ever all infrastructures and will have excellent management accessibility along with the total control on the security level.

Similarly, a directory service also offers total security and accessibility to the process of identification. The structure of the identification depends entirely on the services provided by the directory. MPS would be benefited a lot by the help of this directory services because it will allow accessing multiple repository for data to be identified, which will provide MPS with assistance and they will be accessing the data with all the security and an ease.

These systems have all the verification and authentications they offer absolute security to avoid any mishaps, and for instance, they help in avoiding that data which is unauthorized to access. The system has the automated information base which let the user know that they are legitimate to have access to unauthorized data or not. The system also provides having the complete track of the activities that have done by the ...
Related Ads