Risks of Single Sign-on (SSO) Password Systems Essay

Risks of Single Sign-on (SSO) Password Systems Essay

Length: 2595 words (7.4 double-spaced pages)

Rating: Research Papers

Open Document

Essay Preview

The use of the internet and internet related technology is expanding and growing. Many businesses, and institutions such as schools, hospitals, and hotels are incorporating the use of the internet in almost all their functions. It would be important at this point to define the term internet, which can be referred to as a collection of networks that are particularly used instructions known as Transmission Control Protocol over Internet Protocol (TCP/IP) to communicate. (Stroud, 29-32). It has also been defined as a wide set of networks that are not dependent, and are interconnected to give it’s the appearance of a single and uniformed network." (National Research Council, 54)
The internet has become an integral part of the lives of many individuals all around the globe. Internet usage in the world has been accelerated by the ease brought bout in its usage. The internet provides vast amount of information at just a click of a button. The use of the internet has grown to become a delivery mechanism for massive amounts of multimedia information to a global audience. It is used in business transactions, with the use of the internet to do business being referred to as e-commerce. (Stroud, 60) E-commerce is increasingly expanding, as well as the materialization of new forms of networking, and the possibility of the mush low-priced terascale computing. (Standage, T. 165-180)
The internet has become more widespread than ever in history. As at June 30th the Internet world statistics stood at approximately 2.5 billion users representing 34% of the whole the world’s population. A new report by UN’s international Telecommunications Union revealed the extensive growth in the internet. According to the study the body revealed...

... middle of paper ...

...of Commercially Deployed Single-Sign-On Web Services . Bloomington: Indiana University Bloomington .
SOPHOS. (2013). Security Threat Report 2013. New York: SOPHOS.
Sung Min Kim, J. O. (2011). Security Management of a Cloud-based U-City Management System . Seoul, Korea: International Conference on Cloud Computing.
Anderson T, Peterson L, Shenker S. "Global Environment for Network Innovations: Overcoming the Internet Impasse Through Virtualization." 2005. Print.
National Research Council Staff. Internet Coming of Age. National Academic Press Retrieved 27th April 2014 from http://site.ebrary.com/id/10038775?. 2001.
Security Threat Report. "New Platform and Changing Threats." 2012.
Standage, T. The Victorian Internet. New York: Walker and Company. 1998.
Stroud D. Internet Strategies: A Corporate Guide to Exploiting the Internet. Palgrave
Macmillan. 1999.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Risks Of Passwords At The Time With A Little Commentary Essay

- Neumann, P. G. (1994). Risks of passwords. Communications Of The ACM, 37(4), 126. doi:10.1145/175276.175289 This is a brief qualitative analysis of all the risks associated with passwords. It lists the common failure mode of passwords at the time with a little commentary on each. The types are exhaustive attacks, educated guess, derivation, capturing unencrypted passwords, trapdoors, bogus password creation, bypassing authentication, and non-atomic password checking. The author’s opinion is that most password management techniques are only successful at dealing with the first three attack modes....   [tags: Computer security, Authentication, Password]

Research Papers
1161 words (3.3 pages)

Single Sign-On: The One Password Revolution Essay

- In this world, we know that time waits for no one. This is especially true in today's action packed, fast-paced world. For many of us, we are an hour or two behind schedule before we even wake up. We grab the first thing we can to eat and a cup of coffee, and out the door, we fly. We arrive at work five minutes late and sneak in so as not to alert the boss to our tardiness. We access our computer to long in and there is a user name and password required. After the information is provided, we go to the page that we will be using, only to find that there is another user name and password waiting to slow us down....   [tags: Information Technology]

Research Papers
1597 words (4.6 pages)

Essay on Risks of Just in Time Inventory Systems

- The Risks of Being Just-In-Time The following is a guest article written by Nick Koletic, an economics specialist at UCLA. In addition to giving a brief background on Just-In-Time inventory system’s benefits, the article’s main focus is the risks that JIT systems face. Just-In-Time inventory (JIT) is part of a production system whereby a firm vastly reduces inventory from its production processes so that utilization of production inputs and delivery of finished products are accomplished without incurring significant holding costs....   [tags: Business Inventory Systems]

Research Papers
1060 words (3 pages)

Why Organizations Really Need a Web-Based Self-Service Password Reset Tool?

- Password policies are created in an organization to strengthen the security; however, the situation turns turtle when the complaints to reset the password consume much of the time and resources of the IT helpdesk staff. Suppose an organization has implemented some ideal password policies such as the password will be expired after specific number of days, no recent passwords should be used during the reset, an account will be locked out after the specified number of failed login attempts, etc. In turn, the IT staff would receive a heavy number of calls either to unlock the account or to reset the password as the users had forgotten their correct password and/or their account had been locked b...   [tags: password policies, data system security methods]

Research Papers
545 words (1.6 pages)

Benefits Of Single Payer Systems Essay

- Despite the successes of single-payer systems in other parts of the world, it is clear that implementing such a system would not be possible in the U.S. due to the staunch refusal to consider such a switch by the conservative party. Dr. Jonathan Oberlander, professor of social medicine at the University of North Carolina, explains that a single-payer system is “an aspiration more than a viable reform program” because there is no viable plan for overcoming the public stigma against tax increases in addition to the obstacles such a reform would have in getting passed (“The Virtues and Vices…”)....   [tags: Health care, Medicine, Health economics]

Research Papers
1136 words (3.2 pages)

Single Sex Schools Vs. Coed Schooling Essay

- Single sex schools have been present in countries other than the United States for years. Recently, a hand full of various public schools in the United States have switched their systems to single sex. Boards of education chose to switch because of the research that scientists and colleges have found from conducting numerous studies on the effects on single sex schooling opposed to coed schooling. By using test scores, researchers have been able to prove that single sex schools positively benefit students more often than not (Kleiner)....   [tags: education system, coed schooling, single sex]

Research Papers
1681 words (4.8 pages)

Superiority Of Single Sex Education Essay

- Superiority of Single-Sex Education Education. It is one of the most important factors in life. Malcolm X, a famous author, once wrote, “Education is our passport to the future, for tomorrow belongs to the people who prepare for it today.” A child’s life depends on what he learns in school. Children need education to support themselves and their families. Additionally, the future of our country’s economy lies on the education of our children. There are many different options, but how does one know which choice is the most beneficial for a child....   [tags: Education, Gender, Single-sex education]

Research Papers
993 words (2.8 pages)

The Strength of Password Meters Essay

- Introduction The seminar was on a very interesting evaluation done on the strength of password meters. Almost all of us are exposed to password-strength meters in our everyday life. The general representation of password meter is a colored bar which when seen as a short red bar indicates a weak password and a long green bar indicates a strong password. The real purpose of a password meter is to show the path for better security to its users. However the strengths and weaknesses of these widely deployed meters has rarely been studied and hence this paper really opens up the real world thing going on....   [tags: better security, requirements, leaks]

Research Papers
775 words (2.2 pages)

Single Gender Classes Essay

- When girls are asked to express their feelings, or if they feel stressed they can share this information with their teachers and friends. They can also provide details and they will look you in the eye when they are explaining their problem. Boys find it very difficult to talk about their feelings and will not give details unless they are asked specific questions. Even then they will give very little information because they do not know how to communicate what their feelings are. Boys deal with moderate stress well and may actually do better because of it....   [tags: Education, Single Sex Classrooms]

Research Papers
2628 words (7.5 pages)

Single-Sex Schooling Essay

- School reforms are not a new concept or trend; they have been developing since our nation’s educational system was founded. School reforms are an attempt to make the education system better; in effect, making our children more prepared to compete globally. The school reform that I have decided to research is single-gender schooling. This is the idea that students perform better academically when they are in classrooms with only classmates of the same sex. I have only had one (experimental) class like this: my 6th-grade science class....   [tags: Single-Gender Classrooms]

Research Papers
2981 words (8.5 pages)