Week 8 Discussion? ? Many organizations use password-based authentication to ?authenticate their users. Passwords that do not meet criteria can ?
Week 8 Discussion
Many organizations use password-based authentication to authenticate their users. Passwords that do not meet criteria can be placed in a vulnerable state. Hackers can use password crackers to guess the passwords and infiltrate systems.
Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on risks associated with password-based authentication. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.
Please respond to the following in a post of at least 200 words:
- Describe the methods organizations use to address the risks associated with password-based authentication.
- Recommend two methods you believe are the most effective in addressing these risks.
- Be sure to justify your recommendations.
- Provide full citations and references, formatted according to Strayer Writing Standards.
- For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses
22 hours ago
Ainsley Williams
RE: Week 8 Discussion
Top of Form
One way used by businesses to alleviate the risks associated is password-based authentication (SSO). Stallings, for example, says that "SSO allows users to access all network resources with a single authentication." Users may sign up for the service, change their status or other information, and unregister from the system. It is possible to alter a person's position or affiliation to a function, business unit, or organization using the user profile. SSO requires users to remember fewer login credentials. The risk of password leakage and misuse is lowered since a single password is used to access all corporate-level internal systems. While using corporate single sign-on (SSO) software solutions, user credentials must be input many times in order to log in to target applications (Karie et al., 2020). Because a username and password are often enough for SSO to work, the target applications do not need to be changed.
One of the suggested options is Microsoft 365. Employees may use Microsoft 365 services such as corporate email management, OneDrive access, Microsoft Teams, SharePoint capabilities, and Microsoft's Multifactor Authentication using their own devices. The goal is to develop a system that allows for multi-platform access across a broad variety of devices while limiting the risk of password abuse.
References
Karie, N. M., Kebande, V. R., Ikuesan, R. A., Sookhak, M., & Venter, H. S. (2020, March). Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security (pp. 1-6).
Bottom of Form
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
