Security Systems

Read Complete Research Material

SECURITY SYSTEMS

Security Systems

Abstract

All organisations face threats to their data and communications systems from natural disasters, human error, technical failures, terrorism, theft and industrial action. While it is imperative to protect the business against ID theft and fraud, it is also vital to be able to share data and systems with trust-worthy employees. This is increasingly important when business depends on flexible working, online services, and collaborative relationships with customers and suppliers. Hence planning and implementing highly resilient infrastructure and processes will minimise unplanned downtime and maintain critical network applications. This creates a level of efficiency within the system in which the users access the relevant information while not being able to violate any security policy. This is essential in big corporations in which information-handling is a sensitive mechanism that needs vigilance, and careful monitoring on a regular basis.

Table of Contents

Abstracti

Introduction1

Techniques involved2

Secure Single Sign-On2

Benefits of Secure Single Sign-On3

Role-Based Access Control (RBAC)4

Advantages of RABC4

Biometrics5

1.Role of Biometric Techniques5

2.Characteristics of Biometrics6

2.1.False Acceptance Rate6

2.1.False Rejection Rate6

Fingerprint7

Iris Recognition8

Applications9

The Biological Identities10

The Digital Identities10

Evidence Collection10

Public Key Infrastructure (PKI)11

Components of PKI12

RSA Algorithm13

Conclusion14

References16

A Review on Needs and Implementation of Security Systems

Introduction

With the advent of new technologies and advancements, there are some concerns that have attracted attention from many employers and corporate citizens. Information security is one such concern. The information security must be understood as a point for external and internal to the organization. If the confidence of clients in a transactional website is essential, the company must also make sure to have implemented all necessary means to fight against internal attempts at fraud and misuse of information.

In Metropolitan Security Services (MSS) a single person has multiple identities to access internal sensitive data from different departments within MPS. This process would be time consuming with a lot of administration work and does not prove to be cost effective (Wainer et.al, 2007, p. 365-84).

The Role-Based Access Control (RBAC) system reduces the wastage of time. Roles define within Metropolitan Security Services on the basis of job competency responsibility and qualification.

(Retrieved From: http://www.engr.sjsu.edu/biometrics)

Figure-1: Different techniques have been adopted to provide a better security system

Techniques involved

Secure Single Sign-On

Biometrics (Fingerprint and Iris recognition)

Biological identities and multiple digital identities.

Multiple digital identities

Secure Single Sign-On

The Metropolitan Security Service has an international repute and occupies a distinctive place in the history of security services. All these people work in different departments, and some of them perform common tasks in all departments. All departments have their own access methods to the internal system, and they control independently (Rodwell et.al, 2007, p. 468-78). Due to this fact, the employers have multiple identities (separate username and password associated with their Job rolls) to access data from different departments of the organization. To solve all these problems, an effective process known as Role based access control (RBAC) was applied. RBAC is best to put into practice by applying a structured framework that divided each task into its different modules (Kuhn et al., 2010, p. 133).

(Retrieved From: http://www.netbt.it/UserFiles/ai_securelogin_sso_Lsito.pdf)

Figure-2: Architecture of secure login single Sign-on

Benefits of Secure Single Sign-On

Increased ...
Related Ads