This document discusses the importance of identity management for protecting business data and systems from security threats. It outlines challenges in managing user identities and access across different applications. Identity management systems, directory services like Active Directory, and federated identity solutions help address these challenges by centralized credential storage, access control, and secure identity sharing between organizations. Failure to properly manage identities leaves organizations vulnerable to attacks like phishing that compromise credentials, and identity theft that can result in significant financial and legal consequences.
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES IJNSA Journal
Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrastructure. To achieve information assurance the management of user privileges affected by events in the user’s identity lifecycle needs to be the determining factor for access control. While the implementation of identity and access management systems makes this initiative feasible, it is the construction and maintenance of the infrastructure that makes it complex and challenging. The objective of this paper1 is to describe the complexities, propose a practical approach to building a foundation for consistent user experience and realizing security synthesis in online universities.
Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing privacy protection, and connecting the diverse web of public and private sector agencies involved in the delivery of today's public service. This article provides an overview of identity and access management literature. It attempts to analyze the business drivers, trends, issues and challenges associated with the implementation of such systems. It then presents a strategic framework and an overall ecosystem for the implementation of identity and access management system in different contexts of applications. It also introduces possible strategies and solutions for the development of a federated national identity infrastructure. It finally sheds light on a recent government implementation in the United Arab Emirates that was launched to develop a modern identity management infrastructure to enable digital identities and support their application in e-government and e-commerce context.
The uncontrollable flow of change in technology these days and use of data, information and knowledge is creating a huge challenges in the front of application User and developer both. Data breaches are happening in every sector and every level of all sectors. These challenges are countless starting from operational to strategic and becoming more challengeable day by day as the penetration of Information technology application among the common man is increasing. Therefore the threat is become real. Everybody customers or companies, retailer or stakeholders , distributor or dealer need assurance; from the provider. corporate face up reputational risks among the user at every step. So there is a need to understand the information technology, a frame work or body which can manage , risks and controls. A body or a system of Privacy management system is which can build a frame work for protection of the data and at the same time can maintain , privacy and agreement issues. This can be done by adoption of a scalable risk-based method which can determine what to be secured and how by performing the certain action.
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
Law firms that establish a secure browsing environment without compromising data security, work culture or productivity gain a competitive advantage. This paper shows how successful law firms are optimizing on both axes: data security and user satisfaction.
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
This report discuses the employment of ethical hacking through a disciplined, systematic analysis as a way of reviewing and strengthening the security of information systems. The preliminary objective of this study is therefore to understand the concept of Ethical Hacking. - By Hansa Edirisinghe
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES IJNSA Journal
Information assurance is at the core of every initiative that an organization executes. For online universities, a common and complex initiative is maintaining user lifecycle and providing seamless access using one identity in a large virtual infrastructure. To achieve information assurance the management of user privileges affected by events in the user’s identity lifecycle needs to be the determining factor for access control. While the implementation of identity and access management systems makes this initiative feasible, it is the construction and maintenance of the infrastructure that makes it complex and challenging. The objective of this paper1 is to describe the complexities, propose a practical approach to building a foundation for consistent user experience and realizing security synthesis in online universities.
Organizations in both public and private sectors are realizing the value of identity and access management technology to address mission-critical needs and to ensure appropriate access to resources across heterogeneous technology environments, and to meet rigorous compliance requirements. A well-designed identity management system is fundamental to enabling better information sharing, enhancing privacy protection, and connecting the diverse web of public and private sector agencies involved in the delivery of today's public service. This article provides an overview of identity and access management literature. It attempts to analyze the business drivers, trends, issues and challenges associated with the implementation of such systems. It then presents a strategic framework and an overall ecosystem for the implementation of identity and access management system in different contexts of applications. It also introduces possible strategies and solutions for the development of a federated national identity infrastructure. It finally sheds light on a recent government implementation in the United Arab Emirates that was launched to develop a modern identity management infrastructure to enable digital identities and support their application in e-government and e-commerce context.
The uncontrollable flow of change in technology these days and use of data, information and knowledge is creating a huge challenges in the front of application User and developer both. Data breaches are happening in every sector and every level of all sectors. These challenges are countless starting from operational to strategic and becoming more challengeable day by day as the penetration of Information technology application among the common man is increasing. Therefore the threat is become real. Everybody customers or companies, retailer or stakeholders , distributor or dealer need assurance; from the provider. corporate face up reputational risks among the user at every step. So there is a need to understand the information technology, a frame work or body which can manage , risks and controls. A body or a system of Privacy management system is which can build a frame work for protection of the data and at the same time can maintain , privacy and agreement issues. This can be done by adoption of a scalable risk-based method which can determine what to be secured and how by performing the certain action.
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
Law firms that establish a secure browsing environment without compromising data security, work culture or productivity gain a competitive advantage. This paper shows how successful law firms are optimizing on both axes: data security and user satisfaction.
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
This report discuses the employment of ethical hacking through a disciplined, systematic analysis as a way of reviewing and strengthening the security of information systems. The preliminary objective of this study is therefore to understand the concept of Ethical Hacking. - By Hansa Edirisinghe
This white paper examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations move toward more effective security.
Analyst Report: The Digital Universe in 2020 - ChinaEMC
This IDC Country Brief discusses China, where the amount of data created, replicated, and consumed each year will grow 24-fold between 2012 and 2020, according to the 2012 IDC Digital Universe study, sponsored by EMC.
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
In the future, it is expected that the industry will be marked with multiple technologies. These technologies will play a crucial role in the improvement of the levels of efficiency that companies exhibit. On the other hand, one of the major weaknesses that will likely arise is a threat to the privacy, integrity, and security of data (Sloane, 2018). Through the use of various technologies such as the internet of things, companies will find it hard to protect their data against breaches (Griffy-Brown, Lazarikos & Chun, 2019). Data breaches will be based on the use of the latest technologies to exploit weaknesses found in the various systems. It is, therefore, recommended that companies must adopt a holistic approach in the development of protective, preventive, and reliable mechanisms of ensuring and guaranteeing information security and reduce the risks of data breaches (Ghosh, Mishra & Mishra, 2019). However, with the current trends, it is expected that more breaches will continue to happen, ranging from the use of phishing, hacking, malware, and also but not limited to ransomware.
Identity and access management is a vital information security control for organizations to minimize the insider threats and advanced persistent threats that are caused by mismanaged user's identities and access control on sensitive business applications. Unauthorized access to business critical IT applications results in information disclosure and financial loss for many organizations across the world. Deployment of identity and access management as an essential information security control will enable organizations to detect or even prevent security breaches due to unauthorized access. This paper elaborates necessary facts for making decisions towards protecting the organization's assets using IAM controls. The purpose of this paper to compare various Identity and access management tools. Mr. Vinay Jayprakash Pol ""Identity and Access Management Tools"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23935.pdf
Paper URL: https://www.ijtsrd.com/management/other/23935/identity-and-access-management-tools/mr-vinay-jayprakash-pol
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
A research study conducted by Gemalto and the 451 Group finds companies are relying on a growing number of cloud applications, increasing their need to secure this SaaS applications. Check out the report and learn why a large number of companies are now in the process of re-evaluating their Identity and Access Management (IAM) and single sign-on (SSO) solutions to ensure they authenticate, authorize and securely manage access to both in-house and cloud applications.
A Multidimensional View of Critical Web Application Security Risks: A Novel '...Cognizant
An actionable guide for website application developers to successfully ward off threats to vulnerabilities in a range of functionalities: user authentication, payment records, cross-site scripting, search, registration, file loading and privilege escalation.
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
Government agencies face the intricate challenge of effectively and securely controlling population flows,
identifying individuals, and managing their access to services, while aligning their strategies with citizen’s
expectations for convenience, security and privacy. Identity Management initiatives, especially after the
increased frequency of terrorist attacks around the world, have become a political imperative of
unprecedented urgency, for an increasing number of governments around the world. The India’s answer
to this challenge is expressed through the proposed UID Scheme.
This paper details all the architecture considerations and its realizations ...
Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides "in" or "outside" the corporate boundaries. This happens as the permissions embedded inside the file don't allow unauthorized access, modification, copying or printing. This is typically done for protection of financial documents, intellectual property such as patents, design blueprints and executive communications.
IRM will address information security needs for all types of enterprises.IRM is a set of policies and technologies that help enterprises control the usage of information contained in shared documents.
The E-commerce environment allows companies such as Amazon, EBay, PayPal, financial institutions, and other e-commerce companies alike to allocate services to the consumer over the Internet resulting in the luxury of consumers not visiting a physical store. However, with that luxury also welcomes the risk of threats such as hackers and their various attacks on e-commerce sites and its consumers. To mitigate such risks, adequate security tools are implemented by companies to protect consumers from being victims of identity theft. However, some of the security tools implemented can have limitations in regards to protecting the required assets. In addition, companies offering e-commerce services should invest in additional security controls to implement into their network infrastructure to ensure a safe online environment for their consumers.
This Frost & Sullivan analyst report reveals how the legal and threat environment, combined with BYOD and cost factors, make multi-factor, risk-based authentication the logical approach to solving the security challenges posed by threat actors.
Identity Security
Identity security, also known as identity and access management (IAM), refers to a set of practices and technologies used to protect an individual's or organization's digital identity from unauthorized access, theft, or misuse.
Identity security involves managing user access to systems and data, including authentication (verifying the identity of a user), authorization (determining what actions a user is allowed to perform), and accounting (tracking user activity).
Some common identity security practices include strong password policies, multi-factor authentication, access control policies, and regular monitoring and auditing of user activity.
Ensuring strong identity security is crucial in today's digital world, where cyber threats such as identity theft, phishing, and hacking are becoming increasingly prevalent. A breach in identity security can result in financial losses, reputational damage, and legal liabilities for individuals and organizations.
What is Identity Security?
A complete solution for protecting all identities used in an organisation is identity security. It makes the assumption that any identity, including IT administrators, remote workers, third-party vendors, devices, and applications, has the potential to gain privileges under specific circumstances, opening up a door for attackers to access a company's most precious properties. Because of this, an Identity Security method that's also based on privileged control access safeguards all personas or machine—during the process of gaining the necessary resources.
A thorough method to identity security involves precisely authentification each identity, authorising also every identity with the proper authorization, and giving access for that identity to born into privilege assets in a structured way — in an organized way that can be evaluated (or accounted for) to guarantee that the whole process is sound. Organizations should be able to safeguard access across any device, anytime, and at the perfect moment thanks to identity security so they won't have to pick between security and performance.
Why is Identity Security Important?
Identity theft attacks have long been seen as an important channel for organisations to safeguard. The number and variety of identities being used, though, having substantially expanded as a result of current developments over the last several years. For instance, businesses have quickly embraced cloud-based services and technology to improve their competitiveness and provide their clients with engaging digital experiences. As well, they have seen an increase in assistance for dispersed and virtual workforces. All of these trends saw a sharp increase in speed in 2020, a year in which only businesses with robust digital businesses saw success. Attackers are simultaneously developing new strategies and refining old ones, that has given rise to new and enlarged danger landscape aspects.
Identity security is important for several reasons:
1.
This white paper examines the need for strong authentication and explores the return on investment that can be realized in order to help organizations move toward more effective security.
Analyst Report: The Digital Universe in 2020 - ChinaEMC
This IDC Country Brief discusses China, where the amount of data created, replicated, and consumed each year will grow 24-fold between 2012 and 2020, according to the 2012 IDC Digital Universe study, sponsored by EMC.
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
In the future, it is expected that the industry will be marked with multiple technologies. These technologies will play a crucial role in the improvement of the levels of efficiency that companies exhibit. On the other hand, one of the major weaknesses that will likely arise is a threat to the privacy, integrity, and security of data (Sloane, 2018). Through the use of various technologies such as the internet of things, companies will find it hard to protect their data against breaches (Griffy-Brown, Lazarikos & Chun, 2019). Data breaches will be based on the use of the latest technologies to exploit weaknesses found in the various systems. It is, therefore, recommended that companies must adopt a holistic approach in the development of protective, preventive, and reliable mechanisms of ensuring and guaranteeing information security and reduce the risks of data breaches (Ghosh, Mishra & Mishra, 2019). However, with the current trends, it is expected that more breaches will continue to happen, ranging from the use of phishing, hacking, malware, and also but not limited to ransomware.
Identity and access management is a vital information security control for organizations to minimize the insider threats and advanced persistent threats that are caused by mismanaged user's identities and access control on sensitive business applications. Unauthorized access to business critical IT applications results in information disclosure and financial loss for many organizations across the world. Deployment of identity and access management as an essential information security control will enable organizations to detect or even prevent security breaches due to unauthorized access. This paper elaborates necessary facts for making decisions towards protecting the organization's assets using IAM controls. The purpose of this paper to compare various Identity and access management tools. Mr. Vinay Jayprakash Pol ""Identity and Access Management Tools"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23935.pdf
Paper URL: https://www.ijtsrd.com/management/other/23935/identity-and-access-management-tools/mr-vinay-jayprakash-pol
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
A research study conducted by Gemalto and the 451 Group finds companies are relying on a growing number of cloud applications, increasing their need to secure this SaaS applications. Check out the report and learn why a large number of companies are now in the process of re-evaluating their Identity and Access Management (IAM) and single sign-on (SSO) solutions to ensure they authenticate, authorize and securely manage access to both in-house and cloud applications.
A Multidimensional View of Critical Web Application Security Risks: A Novel '...Cognizant
An actionable guide for website application developers to successfully ward off threats to vulnerabilities in a range of functionalities: user authentication, payment records, cross-site scripting, search, registration, file loading and privilege escalation.
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
Government agencies face the intricate challenge of effectively and securely controlling population flows,
identifying individuals, and managing their access to services, while aligning their strategies with citizen’s
expectations for convenience, security and privacy. Identity Management initiatives, especially after the
increased frequency of terrorist attacks around the world, have become a political imperative of
unprecedented urgency, for an increasing number of governments around the world. The India’s answer
to this challenge is expressed through the proposed UID Scheme.
This paper details all the architecture considerations and its realizations ...
Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides "in" or "outside" the corporate boundaries. This happens as the permissions embedded inside the file don't allow unauthorized access, modification, copying or printing. This is typically done for protection of financial documents, intellectual property such as patents, design blueprints and executive communications.
IRM will address information security needs for all types of enterprises.IRM is a set of policies and technologies that help enterprises control the usage of information contained in shared documents.
The E-commerce environment allows companies such as Amazon, EBay, PayPal, financial institutions, and other e-commerce companies alike to allocate services to the consumer over the Internet resulting in the luxury of consumers not visiting a physical store. However, with that luxury also welcomes the risk of threats such as hackers and their various attacks on e-commerce sites and its consumers. To mitigate such risks, adequate security tools are implemented by companies to protect consumers from being victims of identity theft. However, some of the security tools implemented can have limitations in regards to protecting the required assets. In addition, companies offering e-commerce services should invest in additional security controls to implement into their network infrastructure to ensure a safe online environment for their consumers.
This Frost & Sullivan analyst report reveals how the legal and threat environment, combined with BYOD and cost factors, make multi-factor, risk-based authentication the logical approach to solving the security challenges posed by threat actors.
Identity Security
Identity security, also known as identity and access management (IAM), refers to a set of practices and technologies used to protect an individual's or organization's digital identity from unauthorized access, theft, or misuse.
Identity security involves managing user access to systems and data, including authentication (verifying the identity of a user), authorization (determining what actions a user is allowed to perform), and accounting (tracking user activity).
Some common identity security practices include strong password policies, multi-factor authentication, access control policies, and regular monitoring and auditing of user activity.
Ensuring strong identity security is crucial in today's digital world, where cyber threats such as identity theft, phishing, and hacking are becoming increasingly prevalent. A breach in identity security can result in financial losses, reputational damage, and legal liabilities for individuals and organizations.
What is Identity Security?
A complete solution for protecting all identities used in an organisation is identity security. It makes the assumption that any identity, including IT administrators, remote workers, third-party vendors, devices, and applications, has the potential to gain privileges under specific circumstances, opening up a door for attackers to access a company's most precious properties. Because of this, an Identity Security method that's also based on privileged control access safeguards all personas or machine—during the process of gaining the necessary resources.
A thorough method to identity security involves precisely authentification each identity, authorising also every identity with the proper authorization, and giving access for that identity to born into privilege assets in a structured way — in an organized way that can be evaluated (or accounted for) to guarantee that the whole process is sound. Organizations should be able to safeguard access across any device, anytime, and at the perfect moment thanks to identity security so they won't have to pick between security and performance.
Why is Identity Security Important?
Identity theft attacks have long been seen as an important channel for organisations to safeguard. The number and variety of identities being used, though, having substantially expanded as a result of current developments over the last several years. For instance, businesses have quickly embraced cloud-based services and technology to improve their competitiveness and provide their clients with engaging digital experiences. As well, they have seen an increase in assistance for dispersed and virtual workforces. All of these trends saw a sharp increase in speed in 2020, a year in which only businesses with robust digital businesses saw success. Attackers are simultaneously developing new strategies and refining old ones, that has given rise to new and enlarged danger landscape aspects.
Identity security is important for several reasons:
1.
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience.
This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM) to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.
Identity and Access Management The Key to Strong Cybersecurity.pdfEnfology Services
In today's digital world, businesses must protect themselves against a growing number of cyber threats, and identity and access management (IAM) is a critical component of a comprehensive cyber security services strategy. IAM is a set of technologies and processes that secure and manage access to digital resources, ensuring that only authorized users can access sensitive information.
Cyber 101: An introduction to privileged access managementseadeloitte
Gartner has named privileged access management the #1 cyber security priority for organisations. But what exactly does privileged access management entail?
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
User authentication is a process that allows a website, application, or device to verify the identity of its users. The main purpose of user authentication is to ensure that no third-party or unknown user has access to your account.
Download this eBook for more information: https://bit.ly/3WoKwpy
What are the essential features of Identity and Access Management_ - Bahaa Ab...Bahaa Abdulhadi
As per Bahaa Abdul Hadi, Loss of credibility, theft of identity and takeover attacks assume a huge part of cyber attacks. Information technology can mitigate the risks by making a strong case for identity management. As a part of the security and service model in the cloud, the prime focus of identity and theft management solutions is to concentrate on the security provided by the cloud servers.
What is IT supposed to provision access to in 2016? What is important and how can you increase your business's security and efficiency in the process? This guide explains.
ANALYSIS ON IDENTITY MANAGEMENT SYSTEMS WITH EXTENDED STATE-OF-THE-ART IDM TA...ijasuc
Every person has his/her own identity. It’s important to manage a digital identity in a computer network,
with high priority. In spite of different applications we use in organization, resources need to be managed
and allotted to the appropriate user with proper access rights. Identity management or IdM refers to how
humans are identified, authorized and managed across computer networks. It covers issues such as how
users are given an identity, the protection of that identity and the technologies supporting that protection.
This paper attempts to provide an analysis to various identity management systems based on the state-ofthe-art identity taxonomy factors.
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
Hundreds of companies, and the most demanding Federal agencies rely on DMI for Mobile Security services and solutions. And with more than 500,000 devices under management, we know how to do it right.
Now we’ve distilled 9 years of Mobile Security best practices into a white paper you can download. The paper lays out a smart, sensible approach to managing mobile risk without unnecessary cost and business disruption.
Please be our guest and check out the white paper. You’ll learn:
How to identify and protect against the threats that matter the most
What to do about “the hottest new technologies”
How to get the most protection for the least cost and disruption
The key differences and similarities between Mobile and traditional cybersecurity
- See more at: http://dminc.com/solutions/enterprise-mobility-services/mobilesecuritywp/#sthash.yTptNZRw.dpuf
Why Identity Management is Crucial in the Modern World_ - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
The current era is one that is marked with technology touching every field and industry, from e-commerce to airlines observed Bahaa Abdul Hadi. The majority of big businesses manage their operations with automation. The digital space is a crucial part of most organizations. Digital operations and networks provide organizations and businesses with key safety systems, the need of the hour to keep companies secure. Nonetheless, the security that is related with identity is a challenge for governmental and non-profit bodies. Consequently, the public sector faces the brunt of security issues and identity management is a must here.
Identity management is the combination of business process and technology used to manage data on IT systems and applications about users. Managed data includes user objects, identity attributes, security entitlements and authentication factors.
This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
Similar to Business Impact of Identity Management In Information Technology (20)
Structure failure often occurs in the structure of wall. This failure can adversely affect the comfort level of the structure. Knowing the behavior of structure resulting from the load is important, as it can help to predict the strength of the structure and comfort of the structure being worked on. One way to find out and predict the strength and comfort of the structure as a result of the load received is experimental test and simulation. The simulation VecTor2 used to predict the shear force, crack, and displacement of reinforced concrete wall when applied the load. This simulation considered the effect of bond stress-slip effect of behavior reinforced concrete. Bonds stress-slip gives a great influence on the strength and hysteretic response of the reinforced concrete wall. That is why this study considers the influence of bond stress-slip on reinforced concrete wall. All the result of simulation VecTor2 using bond stress-slip effect would be compared with the result of the experimental test to see the accuracy of the simulation test.
The concept of sustainable construction is increasingly affecting the development of the construction market.The specificity of construction as an economic activity and ofthe construction product (goods and services) determine the existence of a complex vertical chain of links, involving different actors, who tend to work in the short term and are limited to the rational use of knowledge and experience in practice. Moreover, it is characterized by a low level of inter-company relationshipsresulting in a fragmentation of responsibilityand complicates and hinders the realization of projects and sites,which meet the requirements of sustainable construction. Sustainable construction requires a holistic approach and substantial changes in the organization of construction activity, both at the market and firm level, under the active role of the state. The aim of the study is: 1) analysis of problems in the vertical chain of connections in the construction market, 2)an analysis of the possibilities for creating stable long-term relationships and a joint approach of clients, contractors and subcontractors, which can provide economic, social and environmental efficiency of the construction.
Since the recent development of UAVs(Unmanned Aerial Vehicles) and digital sensors technology has enabled the acquisition of high-resolution image data, it is considered that the image data of riverside can be analysed. Therefore, this study analyses the applicability of remote sensing techniques through image analysis in river systems and habitats. The target stream in this study was the Cheongmi stream and the applicability of the river environmental evaluation technique was analysed through image analysis. The satellite images used for the analysis of river topography and environments were compared with the aerial images taken by a micro UAV), and the river environmental evaluation was carried out with the field research at the same time. The data acquisition range and application limit by river environmental evaluation technique proposed previously were evaluated, and as a result, it was found that it was possible to draw various evaluation parameters using a drone that could take an image at a low altitude in comparison to satellite images.
Industrial engineering is founded on the idea that there is always a better way. This mantra rings true in everything an industrial engineer does, from lean manufacturing to six sigma, to quality control and ergonomics. This paper demonstrates the uniqueness of this discipline, the impact its techniques has in sectors outside of manufacturing, and the positive effects it has on businesses.
The study was carried out using the UAV for analyzing the characteristics of debris in order to present the methodology to estimate the quantitative amount of debris caught in small river facilities. A total of six small rivers that maintained the form of a natural river were selected for collecting UAV images, and the grouping of each target in the image was carried out using the object-based classification method, and based on the object-based classification result of the UAV images, the land cover classification for the status of factors causing the generation of debris for six target sections was carried out by applying the screen digitizing method. In addition, in order to verify the accuracy of the classification result, the error matrix was performed, securing the reliability of the result. The accuracy analysis result showed that for all six target sections, the overall accuracy was 93.95% and the Kappa coefficient was 0.93, showing an excellent result.
Multilevel Inverters are getting popular and have become more attractive to researchers in the recent times for high power applications due to their better power quality and higher efficiency as compared to two level inverters. This research work presents a detailed comparative analysis of various multicarrier sinusoidal PWM schemes such as In Phase Disposition, Phase Opposition Disposition and Alternate Phase Opposite Disposition implemented on five level conventional and modified cascaded h-bridge inverters in MATLAB/SIMULINK software. Conventional five level topology uses eight switches and suffers from increased switching complexity while modified five level topology uses only five switches and is recommended to reduce switching complexity and switching losses. It also ensures less number of components, reduced size and overall cost of the system. The effect of modulation index (Ma) on the output harmonic contents in various PWM techniques is also analyzed.
Objective: Cervical cancer (CC) is one of the leading causes of cancer-related deaths among women worldwide.Human papillomavirus (HPV) is the most important element in this disease.The aim of this study is to prepare TiO2/ZnO nanocomposite (NC), titanium dioxide (TiO2) and zinc oxide (ZnO)nanoparticles (NPs) to determine the anticancer activity on human CC cell line (HeLa) and healthy mouse fibroblast cell line (L-929). Materials&Methods: ZnO, TiO2 NPs and NC were prepared by a solution combustion synthesis method. The samples were characterized by ultraviolet–visible spectroscopy. Stability analysis was performed with zeta potential. The synthesized NC and NPs were permormed to the HeLa and L-929 cell lines and anticancer activity of these NC and NPs were determined by using MTT method. The HeLa and L-929 cells were treated with different concentrations of these NC and NPs (0,5-100 μg/ml) for 24, 48 and 72 hours. The spectrophotometric readings at 570 nm were recorded and analysed with Graphpad Prism7. Results: NC and NPs were successfully synthesized. The effects of these NC and NPs on the HeLa and L-929 cells were compared with the control group and IC50 values were determined for 24, 48 and 72 hours. Then we compared the effects of these molecules on the L-929 cell line with the HeLa cell line and founded more active is on HeLa cells. Conclusion:There are many drugs used in CC treatment. However, undesirable toxicity and drug resistance of these drugs negatively affect treatment.We have synthesized NC and NPs in order to formulate basis of a new drug in this study and have identified anti-cancer activity.As a result, we found that NC and NPs anti-cancer activity was higher in HeLa cells than in L-929.
Graphene is a material that attracts attention in technical textile applications as in many other areas due to its outstanding features. In this study, it was aimed to investigate the performance properties of graphene coated fabrics. Pre-treated polyester fabrics were coated with nano-graphene powders at different concentration rates (50, 100 and 200 g/kg) by knife-over-roll technique. According to test results, generally, the graphene coating had a positive effect on the performance properties of polyester fabrics.
This study was focused on the effects of Sugarcane Bagasse Ash (SCBA) additive on process parameters and compost quality of Co-composting of filter cake and bagasse. Filter cake and bagasse were mixed and sugar cane bagasse ash (SCBA) from a heating power plant of sugar mill. Three compost mixes (M) were obtained: MA with 0%, MB with 10% and MC with 20 wt % of fuel ash. These three different mixes were composted in an experimental composter as three parallel experiments for 3 weeks each. The physical, chemical and biological parameters were monitoring during composting. Significantly, ash additives decreased the total organic carbon; measured by mineralization the breaking down of the organic matter was more rapid in the MC than in the MA, as well as increased the pH during composting. Interesting, the pH decreased was most important in MA and attend 5 for the first week of composting, and then it gradually increased to pH around 8 at the end of the process. The results indicated that ash inhibits the pH drop due to production of organic acids during composting. The acidity of the material was reported as affects the process during the initial phase of rising temperature and quality of the final product. The temperature reached up to 50-55oC during thermophilic phase, the greater temperature was obtained for MC. At the end of composting, the electrical conductivity increased in the MC, especially in MC, but don’t exceed limit (4 mS/cm) for prevent phytotoxicity of the compost. The SCBA additive was likely to speed up the composting process of bagasse with filter cake from 44 days to 33 days.
The work presents report on production and analysis of bioresin from epoxidized mango kernel oil (EMKO). The bioresin (acrylated epoxidized mango kernel oil) or AEMKO was produced from epoxidized mango kernel oil via acrylation chemical reaction route. The FTIR spectrum analysis of epoxidized mango kernel oil (EMKO) and acrylated epoxidized mango kernel oil (AEMKO) produced gave the degree of acrylation (DOA) as 46%. The Viscosity of AEMKO (resin) was determined at room temperature (25 °C) to be 387cP while the density at 25oC was 1.2 g/cm3. The glass transition temperature (Tg) of the bioresin was determined to be 95oC. Production cost analysis of the bioresin was done and found to be N8, 804.35 per litre. The high cost was due to high costs of the chemicals, labour and overhead charges involved at my local level. At commercial level, those components of the costs would definitely reduce to the level compatible with synthetic (polyester) resin (N2, 500 per litre) currently sold by some markers in Nigeria. However, the overall results of the work demonstrated that bioresin can be successfully synthesized from mango kernel oil with properties compatible with ASTM standards. The commercial production of the bioresin will go a long way in mitigating some of the challenges associated with total use of fossil fuel currently use for production of bulk of synthetic resins for composite manufacturing activities.
The window functions used for digital filter design are used to eliminate oscillations in
the FIR (Finite Impulse Response) filter design. In this work, the use of Particle Swarm Optimization
(PSO) algorithm is proposed in the design of cosh window function, in which has widely used in the
literature and has useful spectral parameters. The cosh window is a window function derived from the
Kaiser window. It is more advantageous than the Kaiser window because there is no power series
expansion in the time domain representation. The designed window function shows better ripple ratio
characteristics than other window functions commonly used in the literature. The results obtained
were presented in tables and figures and successful results were obtained
The aim of the study was to investigate the relationship between 2D gray scale pixels and 3D gray scale pixels of image reconstructions in computed tomography (CT). The 3D space image reconstruction from data projection was a challenging and difficult research problem. The image was normally reconstructed from the 2D data from CT data projection. In this descriptive study, a synthetics 3D Shepp-Logan phantom was used to simulate the actual data projection from a CT scanner. Real-time data projection of a human abdomen was also included in this study. Additionally, the Graphical User Interface (GUI) for the application was designed using Matlab Graphical User Interface Development Environment (GUIDE). The application was able to reconstruct 2D and 3D images in their respective spaces successfully.The image reconstruction for CT in 3D space was analyzedalong with 2D space in order to show their relationships and shared properties for the purpose of constructing these images.
In this work the antimicrobial activity and the economic viability analysis of the essential oil extracted from the hybrid formed by the seeds species of the Murupi (Capsicum chinense), Criollos de Morellos (Capsicum annuum) and Finger of the young (Capsicum baccatum ). The essential oil of the pepper was obtained by the steam drag process and for this extraction, the Soxhlet method was used. For the determination of the antimicrobial activity of the oil the disc diffusion method was used for the strains of Bacillus cereus, Staphylococcus aureus and Escherichia coli. The results point out the resistance of the tested strains to the essential oil of the respective pepper and, in terms of financial and economic aspects, this was not feasible on a small scale. It is suggested that other microorganisms be tested and, later, that studies be carried out with the purpose of characterizing the studied oil chemically for proper application in the agroindustry.
Eliminating Gibbs phenomenon, which occurs during design of Finite Impulse Response (FIR) digital filter and which is undesirable, is very important in order to provide expected performance from digital filter. Window functions have been developed to eliminate these oscillations and to improve the performance of the filter in this regard. In this work, an application was developed for designing window function using LABVIEW which is a graphical programming environment produced by National Instruments. LABVIEW offers a powerful programming environment away from complexity. In this work, the performances of cosh and exponential window functions, which are designed by using the possibilities of LABVIEW in programming, are examined and the situations that will occur under various conditions are compared.
Better efficiency of the air transport system of a country at the national level, especially in terms of its
capacity to generate value for passenger flow and cargo transport, effectively depends on the identification of
the demand generation potential of each hub for this type of service. This requires the mapping of the passenger
flow and volume of cargo transport of each region served by the system and the number of connections. The
main goal of this study was to identify important factors that account for the great variability (demand) of
regional hubsof the airport modal system in operation in the State of São Paulo, the most populated and
industrialized in the Southeast region in Brazil. For this purpose, datasets for each airport related to passengers
or cargo flow were obtained from time series data in the period ranging from January 01, 2008 to December
31, 2014. Different data analysis approaches could imply in better mapping of the flow of the air modal system
from the evaluation of some factors related to operations/volume. Therefore, different statistical models - such
as multiple linear regression with normal errors and new stochastic volatility (SV) models - are introduced in
this study, to provide a better view of the operation system in the four main regional hubs, within a large group
of 32 airports reported in the dataset.
Linear attenuation coefficient (휇) is a measure of the ability of a medium to diffuse and absorb radiation. In the interaction of radiation with matter, the linear absorption coefficient plays an important role because during the passage of radiation through a medium, its absorption depends on the wavelength of the radiation and the thickness and nature of the medium. Experiments to determine linear absorption coefficient for Lead, Copper and Aluminum were carried out in air. The result showed that linear absorption Coefficient for Lead is 0.545cm – 1, Copper is 0.139cm-1 and Aluminum is 0.271cm-1 using gamma-rays. The results agree with standard values.
This study presents results of Activity Concentrations, Absorbed dose rate and the Annual Effective dose rates of naturally occurring radionuclides (40K, 232Th and 226Ra) absorbed in 8 soil samples collected from different areas within the Ajiwei mining sites in Niger State, North Central Nigeria. A laboratory γ-ray spectrometry NaI (Tl) at the Centre for Energy Research and Training (CERT), Ahmadu Bello University Zaria, was used to carry out the analysis of the soil samples. The values of Activity Concentration for 40K ranged from 421.6174 ± 7.9316 to 768.7403 ± 7.9315; for 226Ra it ranged from 20.6257 ± 2.0858 to 44.0324 ± 5.0985 and for 232Th the ranged is from 23.7172 ± 1.3683 to 62.7137 ± 4.1049 Bq.Kg-1. While the Absorbed Dose for 40K ranged from 17.5814 ± 0.3307 to 32.0565 ± 0.3307 ŋGy.h-1, for 226Ra the range is from 9.5291 ± 0.9636 to 20.3430 ± 2.3555 ŋGy.h-1 and for 232Th range from 14.3252 ± 0.4414 to 37.8791 ± 2.4794 ŋGy.h-1. The total average Absorbed Dose rate of the 8 soil samples collected is 63.7877 ŋGy.h-1 and the estimated Annual Effective Dose for the sampled areas range from 0.0636- 0.1028mSvy-1 (i.e 64 – 103 μSv.y-1), with an average Annual Effective Dose of 0.0782 mSv.y-1 (i.e. 78.2 μSv.y-1). These results show’s that the radiation exposure level reaching members of the public in the study areas is lower than the recommended limit value of 1 mSv.y-1 (UNSCEAR, 2000). Also the mean Radium Equivalents obtained ranged from 107.3259 BqKg-1 (AJ1) to 179.4064 BqKg-1 (AJ4). These results show that the recommended Radium Equivalent Concentration is ≤ 370 BqKg-1 which is the requirement for soil materials to be used for dwellings, this implies that the soil from this site is suitable use for residential buildings. The mean External Hazard Index ( Hext ) ranged from 0.1229 Bqkg-1 (AJ3) to 0.4226 Bqkg-1 (AJ7).. While the maximum allowed value of (Hext = 1) corresponds to the upper limit of Raeq (370 BqKg-1) in order to limit the external gamma radiation dose from the soil materials to 1.5 mGy y-1. That is, this Index should be equal to or less than unity (Hext ≤ = 1). Furthermore, the mean Internal Hazard Index (Hext) ranged from 0.3456 Bqkg-1 (AJ1) to 0.6453 Bqkg-1 (AJ2) .Finally, the mean value of the Excess Alpha Radiation (Iα) ranged from 0.1031 Bq.Kg-1 (AJ1) to 0.2202 Bq.Kg-1 (AJ3. All these values for Iα are below the maximum permissible value of Iα= 1 which corresponds to 200 Bq.Kg-1. It can therefore be said that no radiological hazard is envisaged to dwellers of the study areas and the miners working on those sites area.
Pick and place task is one among the most important tasks in industrial field handled by “Selective
Compliance Assembly Robot Arm” (SCARA). Repeatability with high-speed movement in horizontal plane is
remarkable feature of this type of manipulator. The challenge of design SCARA is the difficulty of achieving
stability of high-speed movement with long length of links. Shorter links arm can move more stable. This
condition made the links should be considered restrict then followed by restriction of operation area
(workspace). In this research, authors demonstrated on expanding SCARA robot’s workspace in horizontal area
via linear sliding actuator that embedded to base link of the robot arm. With one additional prismatic joint the
previous robot manipulator with 3 degree of freedom (3-DOF), 2 revolute joints and 1 prismatic joint is become
4-DOF PRRP manipulator. This designation increased workspace of robot from 0.5698m2 performed by the
previous arm (without linear actuator) to 1.1281m2 by the propose arm (with linear actuator). The increasing
rate was about 97.97% of workspace with the same links length. The result of experimentation also indicated
that the operation time spent to reach object position was also reduced.
The paper contains several technical solutions of air and moisture permeability in textile
layers and theirs combinations. It is useful collection of the author’s knowledge from several last years.
Discussed are also various marketing declarations of miraculous characteristics of individual used materials.
Examples show not only own technical solution, but also the good description of ongoing processes, using the
method of numerical simulation.
Physical and chemical properties of host environment to concrete structures have serious impact on
the performance and durability of constructed concrete facilities. This paper presents a 7-month study that
simulated the influence of soil contamination due to organic abattoir waste and indiscriminate disposal of spent
hydrocarbon on strength and durability of embedded concrete. Concrete mix, 1:1.5:3 was designed for all cube
and beam specimens with water-cement ratio of 0.5 and the compressive and flexural strengths of the specimen
were measured from age 28 days up to 196 days in the host environment. It was found that both host
environments attack the physical and strength of concrete in compression and flexure. However, hydrocarbon
had much greater adverse effect on the load-carrying capacity of concrete structures and hence make
constructed facilities less serviceable and vulnerable to premature failure.
More from International Journal of Modern Research in Engineering and Technology (20)
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Business Impact of Identity Management In Information Technology
1. w w w . i j m r e t . o r g Page 51
International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 1 Issue 3 ǁ September 2016.
Business Impact of Identity Management In Information
Technology
Mr. Chris Villemuer& Dr. Syed Adeel Ahmed
Abstract: This paper explains the importance of data security through identity management. Businesses must
do everything practical to protect their data and IT systems from malicious parties. Hackers have many tools
and methods at their disposal, such as phishing, to steal identity data and compromise IT systems for malicious
purposes. Even failures by an organization’s own IT department to protect against malicious use from its own
employees have resulted in significant financial losses. These losses could have been prevented had adequate
identity management steps been taken. Usage of technologies such as a centralized Identity Management
System, Directory Services, or Federated Identity Management protect a user’s private information and
effectively control access to business systems. Many core IT business systems and cloud service providers can
leverage these identity management technologies to provide data security and secure access control.
Keywords: Identity management, provisioning, access control, credential, user name, password, directory
service, federated identity, phishing, identity theft
I. Introduction
Many businesses and organizations must
comply with federal rules and regulations to protect
data from unauthorized access by malicious parties.
Stolen or compromised data can yield severe
consequences. These consequences range from
financial loss to legal repercussions from local,
state, or federal government entities. A robust
identity management strategy has become an
important concept in controlling access to data in
business IT systems (F5, 2016). However, due to
lack of unified standards for identity management in
many IT systems, effectively controlling identity
and access is a challenge for many organizations.
Fortunately, there are identity management tools and
methods available that can ease burdens for both IT
administrators and organizations. This paper
discusses the challenges of identity and access
management, and methods for overcoming them.
II. Problem
Organizations face technical, social, and
operational challenges with identity management.
There are key components of identity management
that must be addressed to protect an organization
and its constituent data. Managing these
components of identity management is a challenge
for many organizations. Failing to meet these
challenges of effective identity management has had
severe consequences for government and corporate
entities, and especially their customers. There are
threats both within and outside of organizations that
use various methods of exploiting ineffective
identity management practices to compromise IT
business systems.
2.1. System Access Control
Businesses often use many application systems to
accomplish their goals. Some of these applications
are even critical to the success of the business. For
example, many business office environments today
rely on email as a primary form of communication.
Many employees use a centralized email system
managed by an IT department. Other critical
business application systems used by most
companies include Human Resource Management,
Payroll, Marketing, etc. Each system has its own
means for managing identities and access control
that must be managed. Failing to adequately
monitor and manage access control increases risk of
loss. Inadequate access control invites risk of
system abuses from even legitimate employees. For
example, the 2011 UBS Rogue Trader Scandal
resulted in a staggering $2 billion financial loss for
UBS Bank. A single employee with unauthorized
access to key trading systems performed securities
trades that resulted in financial loss. If IT staff of
UBS had adequately enforced access control, the
loss could have been prevented (Fogarty, 2011).
2.2. Protecting User Credentials
Most application systems require users to present
credentials to access the system. These credentials
can be one or a combination of: username/password,
smart device, and biometrics. Effectively protecting
and managing user credentials in disparate systems
is a challenge in Identity Management. Many
applications have their own systems for identity
management and access control. These systems
store user credentials. User name/password is the
most common credential form used in many IT
systems, and also the most vulnerable. There are
various methods available to malicious entities that
can be used to steal user credentials.
2. International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 1 Issue 4 ǁ October 2016.
w w w . i j m r e t . o r g Page 52
2.2.1. Phishing
This is arguably the simplest, yet most effective
method for maliciously obtaining user credentials.
Phishing is the practice of electronically posing as a
legitimate system authority to trick users into
transferring their credentials, usually for the
fictional purpose of system validation or other false
validation. From there, malicious entities use these
stolen credentials to access systems. Username and
password is the most common, and simplest
credential to transfer via phishing scams. On
November 24, 2014, hackers claimed responsibility
for hacking into Sony Pictures Entertainment IT
systems. Security firm Cylance identified phishing
as the means hackers used to gain credentials to
access Sony’s systems. The credentials were coded
in the “Wiper” malware that was largely responsible
for crippling and compromising Sony Picture
Entertainment (Bisson, 2015). This incident resulted
in significant consequences for Sony Pictures
Entertainment. Employee information, financial
records, server keys, and other sensitive corporate
information was posted publicly by the hackers.
2.2.2. Identity Theft
In recent years, identity theft has become a
significant threat to both organizations and
consumers around the world. Identity theft is the
practice of maliciously using a person’s identifying
information for gain. Examples of applications of
stolen identities include unauthorized access to a
victim’s bank account to steal funds, and
unauthorized uses of a victim’s credit card to pay for
items. These forms of identity theft have both
severe impact to both individuals and financial
institutions involved. Extracting identity
information can be performed in various ways.
Hackers can exploit vulnerabilities in IT business
system software and use that as means to steal
identity information from databases. Even phishing
techniques can be used to trick victims into
revealing sensitive identifying information about
themselves (Douglas, 2016).
III. Method
There are methods and technologies available to
effectively manage identities. These methods have
been the result of years of collaboration between
government, business, and educational institutions.
Often, businesses leverage more than one method to
effectively manage identity and access across the
organization. In most cases this is necessary
because there is no single standard or unifying
solution to identity management for every IT
system. Some business IT systems have specific
identity management requirements that only certain
solutions can meet. Having a variety of identity
management methods available is important to
dynamically meet varying system requirements.
3.1. Identity Management Systems
Identity management systems are hardware and/or
software systems that manage identity and access
control for various other IT systems. Identity
management systems contain specific logic for
interacting with many types of business application
and infrastructure systems. These interactions
include processes for common identity management
tasks such as: provisioning/deprovisioning user
accounts, managing passwords, controlling system
access through groups or role-based access methods.
Microsoft Identity Manager (MIM) is a long-
standing identity management system used by many
organizations. It has gone through numerous
product re-names. However, the core functionality
has remained the same and been expanded upon
over the years (What Is Microsoft Identity Manager
(MIM) 2016, 2015). MIM can
provision/deprovision user accounts in various
popular systems such as Oracle, Office 365, Active
Directory. Timely provisioning and deprovisioning
of user accounts ensures unauthorized access is not
granted to users if their credentials expire. It also
provides self-service password management for
users. This allows organizations to enforce
password policies on users and helps mitigate risks
associated with credential theft. Another key
feature of MIM is Privileged Access Management
(PAM). This ensures users only have necessary
access to systems within a specified time window
according to their role in an organization.
Monitoring and controlling access by a time window
helps mitigate risks of unauthorized access from
even legitimate user accounts.
3.2. Directory Services
Directory services are lightweight databases that
contain structured identity data about a person,
place, or entity. LDAP (Lightweight Directory
Access Protocol) directories were created around
1993, and have been widely used in IT since then.
LDAP is based on the directory X.500 model. A
directory entry contains multiple attributes that can
be used to identify the entry. This is ideal for
identity management as it allows more than one
source of information to be used to identify an
entity. LDAP entries contain a username and
password that is authenticated through an LDAP
interface. This allows for centralized storage and
access of user credentials in a standardized way.
Many business applications can integrate their
identity and access mechanisms with entries in
LDAP directories. This provides centralized access
3. International Journal of Modern Research in Engineering and Technology (IJMRET)
www.ijmret.org Volume 1 Issue 4 ǁ October 2016.
w w w . i j m r e t . o r g Page 53
control and secure credential storage.
There have been several widely used
implementations of LDAP since its inception.
Novell eDirectory, OpenLDAP, and Sun LDAP
directory server are some of the most popular.
However, the most widely used and arguably the
most successful is Microsoft Active Directory. In
addition to providing centralized LDAP structured
data, Active Directory also provides policy
enforcement and other built-in mechanisms to
provide additional security for identity and access
control. Security Groups are a directory entry used
specifically for controlling access to AD/LDAP
integrated systems. Active Directory also provides
a policy enforcement mechanism known a Group
Policy. This allows for enforcement of policies and
standards on user accounts, as well as the machines
these user accounts connect to (Azam, 2012).
3.3. Federated Identity Management
Identity Federation is a relatively new concept in
identity management. It has only started to become
adopted in the past 5-10 years. Instead of
provisioning and managing identity records,
federation approaches identity management by
leveraging existing records. This allows
organizations to use existing identity stores.
Federation allows secure sharing of identity
information with other organizations, without
actually transferring stored user credentials.
Organizations establish a secure, federated digital
trust relationship. This trust allows organizations to
create claims for users. These claims can be used to
control access to applications and services hosted by
other organizations.
Popular cloud service providers such as Google
and Microsoft Office 365 allow customers to create
federated trusts to leverage their cloud services. The
end result is organizations can take advantage of
cloud services while still using their own on premise
identity systems to store user credentials and control
access. Examples of widely used federated identity
management systems include Shibboleth IdP, Gluu,
and Microsoft ADFS (Active Directory Federation
Services). Shibboleth has been one of the most
long-standing federation systems and is still widely
used today.
IV. Conclusion
Businesses and organizations of all sizes
leverage IT to accomplish their goals. Almost all IT
systems require user identities to govern data access.
Failing to address effective identity management in
IT systems creates significant risk of loss for
organizations. Hackers use numerous methods to
exploit identity data for malicious purposes. While
there is no singular, standard approach to identity
management, there are several effective identity
management methods available that help mitigate
risk. One or a combination of these currently
available methods are used by organizations to
protect their data, and most importantly their
customers. Effective identity management methods
must continue to evolve to meet continuing threats
of business losses due to inadequate identity and
access management practices.
REFERENCES
[1] Azam, W. (2012, December 5). Active Directory’s
Introduction and Its Features n Advantages.
Retrieved from W7Cloud:
http://www.w7cloud.com/active-directorys-
introduction-and-its-advantages/
[2] Bisson, D. (2015, April 22). Sony Hackers Used
Phishing Emails to Breach Company Networks.
Retrieved from Tripwire:
http://www.tripwire.com/state-of-security/latest-
security-news/sony-hackers-used-phishing-emails-
to-breach-company-networks/
[3] Douglas, R. (2016). Identity Theft Victim Statistics.
Retrieved from Identity Theft and Scam Prevention
Services: http://www.identitytheft.info/victims.aspx
[4] F5. (2016, February 24). The Challenges and
Benefits of Identity and Access Management.
Retrieved from F5 Networks:
https://f5.com/resources/white-papers/the-
challenges-and-benefits-of-identity-and-access-
management-17862
[5] Fogarty, K. (2011, October 7). UBS admits its
security system did spot the trader who lost $2B, but
ignored it. Retrieved from ITWorld:
http://www.itworld.com/article/2735514/security/ub
s-admits-its-security-system-did-spot-the-trader-
who-lost--2b--but-ignored-it.html
[6] What Is Microsoft Identity Manager (MIM) 2016.
(2015, November 17). Retrieved from
NewSignature:
http://www.infrascience.com/uncategorized/what-is-
microsoft-identity-manager-mim-2016/