Risks of Single Sign-on (SSO) Password Systems

2595 Words11 Pages
Introduction

The use of the internet and internet related technology is expanding and growing. Many businesses, and institutions such as schools, hospitals, and hotels are incorporating the use of the internet in almost all their functions. It would be important at this point to define the term internet, which can be referred to as a collection of networks that are particularly used instructions known as Transmission Control Protocol over Internet Protocol (TCP/IP) to communicate. (Stroud, 29-32). It has also been defined as a wide set of networks that are not dependent, and are interconnected to give it’s the appearance of a single and uniformed network." (National Research Council, 54)

The internet has become an integral part of the lives of many individuals all around the globe. Internet usage in the world has been accelerated by the ease brought bout in its usage. The internet provides vast amount of information at just a click of a button. The use of the internet has grown to become a delivery mechanism for massive amounts of multimedia information to a global audience. It is used in business transactions, with the use of the internet to do business being referred to as e-commerce. (Stroud, 60) E-commerce is increasingly expanding, as well as the materialization of new forms of networking, and the possibility of the mush low-priced terascale computing. (Standage, T. 165-180)

The internet has become more widespread than ever in history. As at June 30th the Internet world statistics stood at approximately 2.5 billion users representing 34% of the whole the world’s population. A new report by UN’s international Telecommunications Union revealed the extensive growth in the internet. According to the study the body revealed...

... middle of paper ...

...of Commercially Deployed Single-Sign-On Web Services . Bloomington: Indiana University Bloomington .

SOPHOS. (2013). Security Threat Report 2013. New York: SOPHOS.

Sung Min Kim, J. O. (2011). Security Management of a Cloud-based U-City Management System . Seoul, Korea: International Conference on Cloud Computing.

Anderson T, Peterson L, Shenker S. "Global Environment for Network Innovations: Overcoming the Internet Impasse Through Virtualization." 2005. Print.

National Research Council Staff. Internet Coming of Age. National Academic Press Retrieved 27th April 2014 from http://site.ebrary.com/id/10038775?. 2001.

Security Threat Report. "New Platform and Changing Threats." 2012.

Standage, T. The Victorian Internet. New York: Walker and Company. 1998.

Stroud D. Internet Strategies: A Corporate Guide to Exploiting the Internet. Palgrave

Macmillan. 1999.

More about Risks of Single Sign-on (SSO) Password Systems

Open Document