Open ID and Web Security
INFORMATION SYSTEMS AND OPERATION MANAGEMENT
Lys Rodríguez de Castro Gonzáles 29484 Verónica Herrera Mestizo 30091 Manuela Oberhof 29477 Minyeong Kang 30084
01/02/2011
19/01/2010
1. Explain why OpenID offer users greater convenience and security than the current system
By using the current system, convenience and security are considered as problems, because the different sites have a different ID for the same user and also because most of this sites are not prepared to focus on security.
Getting to a web page using an Open ID,
…show more content…
Even that the identity provider would solve the security issue; it also can be a weak point in our connection. If there is some kind of phishing into the Open ID service, all our information and passwords are there, so the one who gets into the system could get in our websites or modify our information so that we could not enter again.
Another interesting point to take into account is related to the website we visit and we access to through the Open ID. Many companies rely on user-registration forms to gather information about their clients and/or potential clients. By using an identity provider this kind of information disappears or is hidden, so the companies will need to get the customers data through a different way, which would be costly and hard.
3. Would you consider using an identity provider to access content on the Web? Why or why not?
In our opinion the identity provider is a useful tool; it is a new method that people can use in order to stop giving their personal information to many sites in the web which are not secure enough. It is also easier to remember just one login name and one password instead of having one for each site. Even though, we don’t think that the security issue could be a advantage for them; for example if somebody gets access to your account at an Open ID provider he may get access to any site
On 09/23/2016 at approximately 1:00 AM, this Investigator made contact with Kathrine Castro (DOB: 01-07-74) at
Little or no security is provided as sign in is not required for the users when using the
BUSINESS IMPACTS: SEVERE. This type of impact (insecure authorization) often leads to Identity theft/loss, Fraud, Reputation damage, loss of assets, violation of privacy.
4. If you are an e-commerce manager, would you adopt any of these technologies, and why? (5 marks)
These mostly are dependent on the provider. The first being the security of files stored ie. If they are stored in America or in the EU with a ‘safe harbour’ agreement.
the middle school, Fatima Murguia and Desiree Orellana. Garcia refused to give me her parent's information or address.
In my placement, I have done a lot of case works, documents and assessments with the resident. After the assessment, I need to know how to record and input the progress note to save in the Point Click Care system. To be a professional SSW, I have to respect others and be careful to handle the residents’ privacy. Therefore, I have to sign the consent form by the agency, follow the Social service worker program student code of conduct, and PHIPA.
Data Protection: The data has to be safeguarded from both internally and externally. The organization needs to keep track of the customer’s information safely. There are chances where the employees of the organization send the data of customers to outside. Also the hackers/intruders steal the data when the customers are doing the online transactions.
A website is used by different people for different uses. Each website can be evaluated for its usefulness by the general public based on certain criteria as discussed in this article.
In single sign on, the user registers and authenticates with one site and uses those credentials for identity with other sites (Pros and Cons to Single Sign In, 2009). For the user, it lowers the barriers to participation of registering with sites without trusting them first and reduces the number of credentials with having to remember all the usernames and passwords, making it convenient. The downside for the user is if that one password is lost or forgotten, the user would have to start over rebuilding and online identity, which can be time consuming (Chng, 2008). Single sign on is also highly susceptible to phishing attacks.
Philosophically, training is a key component as well. Uniquely, different people learn using different techniques and merely having access to a site may not be effective for all users.
Patrisse Cullors, from Las Angeles, CA, Alicia Garza, from Oakland, CA., and Opal Tometi, a Nigerian
The risk is the potential of a security breach for the online programs. Employees not only have to learn how to use the new databases, programming, and processing but also understand the basic internet and computer
The use of an enterprise service provider for processing information systems applications such as payroll, human resources, or sales order taking is another excellent way for organizations to minimize cost while still experience the full benefit of an IT system. It is worth noting that while this is very cost effective and significantly reduces the load on an organization, outsourcing an organization's IT applications to an enterprise service provider for processing is a risky path to thread. Information privacy and integrity are at a very great risk here. An enterprise service provider or employers of the provider are capable of selling out the customers, employees and sales information of one organization to another. Employees of the Service providers could also include their name (create false employees) among the names of legitimate employees of the outsourced organization and masquerade as one of the real employees and receive pay every pay period. These and other privacy and integrity concern must be taken into serious consideration by organization outsourcing interested in outsourcing to an enterprise service
The government is actively involved in decreasing the amount of identity theft by providing the most effective tools to investigate and prosecute identity thieves. One of these tools is the Identity