29 May Week 8 Discussion? ? Many organizations use password-based authentication to ?authenticate their users. Passwords that do not meet criteria can ?
Week 8 Discussion
Many organizations use password-based authentication to authenticate their users. Passwords that do not meet criteria can be placed in a vulnerable state. Hackers can use password crackers to guess the passwords and infiltrate systems.
Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on risks associated with password-based authentication. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.
Please respond to the following in a post of at least 200 words:
- Describe the methods organizations use to address the risks associated with password-based authentication.
- Recommend two methods you believe are the most effective in addressing these risks.
- Be sure to justify your recommendations.
- Provide full citations and references, formatted according to Strayer Writing Standards.
- For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses
22 hours ago
Ainsley Williams
RE: Week 8 Discussion
Top of Form
One way used by businesses to alleviate the risks associated is password-based authentication (SSO). Stallings, for example, says that "SSO allows users to access all network resources with a single authentication." Users may sign up for the service, change their status or other information, and unregister from the system. It is possible to alter a person's position or affiliation to a function, business unit, or organization using the user profile. SSO requires users to remember fewer login credentials. The risk of password leakage and misuse is lowered since a single password is used to access all corporate-level internal systems. While using corporate single sign-on (SSO) software solutions, user credentials must be input many times in order to log in to target applications (Karie et al., 2020). Because a username and password are often enough for SSO to work, the target applications do not need to be changed.
One of the suggested options is Microsoft 365. Employees may use Microsoft 365 services such as corporate email management, OneDrive access, Microsoft Teams, SharePoint capabilities, and Microsoft's Multifactor Authentication using their own devices. The goal is to develop a system that allows for multi-platform access across a broad variety of devices while limiting the risk of password abuse.
References
Karie, N. M., Kebande, V. R., Ikuesan, R. A., Sookhak, M., & Venter, H. S. (2020, March). Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security (pp. 1-6).
Bottom of Form
