Discussion: Management of Identity Access in Information Security
Discussion: Management of Identity Access in Information Security ORDER NOW FOR CUSTOMIZED AND ORIGINAL ESSAY PAPERS ON Discussion: Management of Identity Access in Information Security I have attached the final draft that we submitted and the feed back based on the prior submission and the power point deck to be covered in the presentation. Please make sure we address the points given in the feed back and a key note of the audio. Discussion: Management of Identity Access in Information Security _final_draft__1_.docx grad695_wk11_final_draft_feedback_092420__1_.docx presentation_topics.docx Running head: MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY Management of Identity Access in Information Security 1 MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 2 Table of Contents Abstract . 6 Relationship to Curricular Practical Training (CPT) . 7 Overview of CPT Assignment . 7 Proposed Research and Application to Capstone Project .. 7 Relationship to ISEM 7 Introduction . 9 Research Overview 9 Definition of Terms 9 Background 9 Problem Description .. 10 Significance of Research .. 10 Theoretical Framework or Construct . 11 Ethical Consideration . 11 Overview of Remaining Thesis Chapters. .. 11 Problem Statement and Justification 11 Problem Statement .. 11 Purpose Statement 12 Problem Justification . 12 Research Questions . 12 Research Objectives 13 Type of Research Work 13 Deliverables 13 Delimitations of Research 14 Limitations of Research Discussion: Management of Identity Access in Information Security 14 Literature Review . 15 Introduction . 15 Summary of Existing Research Studies 15 Benefits of Implementing RBAC . 21 Summary of Existing Theories . 22 Summary of Existing Methods . 22 Literature Review Relevance to Research Project .. 23 Key Points and Conclusions Derived from Literature Review . 24 MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 3 Research Design and Methodology . 26 Proposed Solutions Overview 26 Research Design Overview . 26 References . 28 MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 4 List of Figures Figure 1: Work Plan . 27 MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 5 List of Tables Table 1: Definition of Terms . 9 Table 2: Milestones and Deliverable .. 13 MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 6 Abstract Cyberattacks often target to access organizational data. The threats to information safety are within and outside organizational jurisdiction. For those within an organization, access can be prevented using role-based access control that limits the files they can access. When using the access control mechanism, users are given roles according to roles and privileges in the company. In this research, the focus is on determining the identity access in information security can be managed in securing organizational data. Specifically, it investigates the problem of weak authentication protocols. Keywords: Access controls, hierarchies, constraints, security breaches, authorizations. MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 7 Relationship to Curricular Practical Training (CPT) Overview of CPT Assignment I am a security analyst in a reputable organization. As a security analyst, my central role in ensuring that company assets are safe from unauthorized access. Discussion: Management of Identity Access in Information Security The company assets that are within my jurisdiction are digital assets, and I am responsible for securing the on premise and online infrastructure by analyzing data and metrics to weed out suspicious activities and mitigation of security risks before they operationalize. I am also responsible for making reports on the efficacy of security policies that administrators use in decision making regarding the security of the networks and training employees on ways of securing organizational data. As a security analyst, I have chosen to write on the management of identity access in information security. Proposed Research and Application to Capstone Project The proposed research is Management of Identity Access in Information Security. The courses that I am doing, such as information security, have offered me a deeper understanding of cyber threats that organizations face, and it is relevant to the security issues that my organization faces. For many organizations, the security of data is key in wooing and retaining customers. In the past, I have seen stories whereby customers desert organizations because they failed to manage data to prevent breaches effectively. In my organization, the security of data has always been important. As a security analyst, I have to find ways of improving the existing security mechanisms for the company to retain customer trust and also increase the customer base. Relationship to ISEM The proposed research is focused on the access of information security systems. Since joining the company, my responsibilities have always rotated between patching security flaws and implementing new security policies that will further secure organizational data. I have MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 8 attended various cybersecurity conferences where I met other experts and shared best practices in information safety. Technologies are advancing, and this has posed security challenges to organizations are technologies advances faster than companies can manage. Advancing technologies are therefore increasing security challenges organizations face and hence the need for information security professionals to network and share best practices in the profession. I have applied role-based access control in my organization as I allocate employees privileges according to their roles. This project that I am undertaking will, therefore, enhance my understanding of role-based access controls, their weaknesses, and ways of improving the security policies. MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 9 Introduction Research Overview The research investigates the management of identity access in information security. Humans have been long regarded as the reasons for the successes and failures of security policies in organizations (Metalidou, et al., 2014). Discussion: Management of Identity Access in Information Security When system loopholes exist in systems due to errors overlooked by designers, the loopholes can be exploited by attackers within a short time. Social engineering is the standard attack used by attackers on organizations. Social engineering capitalizes on human vulnerabilities. Humans have long been regarded as weaknesses in information security. One of the methods used to protect data from attackers is using passwords and usernames. Role-based access control is one method that is being used to limit data breaches in organizations. Definition of Terms Table 1: Definition of Terms Term Access controls Authorization Security breaches Hierarchies Constraints Definition These are techniques for controlling access to resources in organizations. This means giving people specific permissions to access resources in computing environments. These are incidents that lead to unauthorized access to organizational resources by external or internal adversaries. These are ways of organizing roles in a natural manner such that there are those with more roles that are higher in the hierarchy compared to those with few roles. These are restrictions that guide the operations of RBAC. Background Security breaches have increased in recent years, and many organizations have become victims of the attacks. Since the introduction of computer technology, security breaches have been existing. Data breaches are common issues that affect many organizations in the world today. Data leakages are serious issues that affect the operations of an enterprise. The outcome of MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 10 data breaches is the loss of confidential information, and this affects the financial position and reputational damage of an organization (Cheng, Liu, & Yao, 2017). Some organizational information that can be leaked during data breaches is employee data, medical records, and intellectual properties. In 2016 IBM had a data breach that cost the company $4 million (Cheng, Liu, & Yao, 2017). The costs of data breaches are expected to increase to more than $2.1 trillion per year because of the increasing digitization of consumers (Cheng, Liu, & Yao, 2017). Data breaches are not a preserve of this decade, and breaches increased by 50% between 2007 and 2008 (Gordon, Loeb, & Zhou, 2011). Information systems security breaches have implicit and explicit costs that have affected organizations. The implicit costs are those that result in data breaches, such as the lost revenue due to the deterioration of the relationship between customers and their firms. The explicit costs are those used in detecting and correcting the data breaches. Discussion: Management of Identity Access in Information Securityb Problem Description This study will investigate the problem of weak authentication protocol. It is important to note that authentication is one of the most persistent identity management problems. Cybercriminals have been coming up with new techniques to gain access to the data system. Besides, employees have, in the past, become accomplices of data losses. Significance of Research This research is important because individuals and organizations have been losing important and sensitive data to cybercriminals. Additionally, organizations and individuals have been experiencing compromised access to information systems where cyber criminals gain access to the systems and interfere with data. Therefore, this research will be helpful to organizations and individuals in providing them with information on how they can protect and control access to their information systems. MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 11 Theoretical Framework or Construct This proposal specifically focuses on the problem of a weak authentication protocol, which is one of the major problems in the management of identity access in information security. Ethical Consideration The ethical considerations in the research include not causing any form of harm to the research subjects. Harming research subjects is unethical and should be avoided. Research subjects can be harmed in several ways, including physically, emotionally, and spiritually. Further, the human subjects in the research will have informed consent for the research and be aware of any negative consequences. Overview of Remaining Thesis Chapters. The remaining thesis chapter includes Problem Statement and Justification. Another chapter is Literature Review. This chapter covers a summary of existing research studies, summary of existing theories, and a summary of existing methods. It also provides literature review relevance to the research project, as well as key points and conclusions derived from the literature review. Another chapter is Research Design and Methodology. This chapter discusses the proposed solution overview, research design overview, research questions, and objectives to be addressed. It also offers the research design setting, method of data sourcing and data collection, participants, data analysis approach, key outputs, and deliverables, as well as ethical considerations. Problem Statement and Justification Problem Statement There has been an increase in unauthorized access to security systems in the past years. The increased unauthorized access is majorly due to weak authentication, including the MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 12 passwords that are put in place. Organizations have come up with several ways for ensuring the security of their data. However, hackers seem to be a step ahead since they manage to get access to the information due to weaknesses and loopholes in the authentication protocols. Purpose Statement The main purpose of this study is to investigate the management of identity access in information security. Specifically, the study investigates the problem of weak authentication protocols in information systems. Problem Justification The application of role-based access control is a way of preventing unauthorized access to data by employees in organizations. Discussion: Management of Identity Access in Information Security In the role-based access control, different levels of permissions and privileges are given to authorized users to enable them to access organizational data. In many prominent organizations, role-based access is used to provide employees varying levels of access according to their roles and responsibilities in the organization. This mechanism aims to protect information and ensure that employees access information that is relevant to their jobs. When using role-based access control, employees are permitted to read, edit, and delete articles that are related to their roles in the company. This study is an evaluation of the management of identity access in information security in organizations. Research Questions The primary research question in this study is; How can identity access in information security be managed? A secondary research question is; What is the effectiveness of role-based access control in information security? MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 13 Research Objectives To investigate the management of identity access information security. To investigate the effectiveness of role-based access control in information security Type of Research Work The research will be qualitative. It will focus on the non-numerical aspects of the data. The research titled management of identity access in information security is theoretical-based. In this research, the focus is on conducting a theoretical analysis of the management of identity access in information security. Data breaches due to insiders abusing their privileges and permissions in organizations in rampant and the research aims to evaluate how effective rolebased access control is in securing organizational data. Deliverables The deliverables are the outcomes expected from the research proposal. The deliverables explain the reasons for the conduction of the research and how it is related to my profession. For this research, the proposal aims to discuss the management of identity access in information security. Role-based access is among the oldest ways of protecting organizational data, and it limits employees to access only files that are relevant to their roles and responsibilities in the organization. This way, the employees cannot access confidential data that are not relevant to their roles and hence keeps the data safe.Discussion: Management of Identity Access in Information Security Table 2: Milestones and Deliverable Milestone Deliverables Initiation Research Definitions Define the overall aspects of the research proposal Relate the research proposal to my CPT Introduce the topic State the research questions Research Proposal Execution Propose solutions collect data on possible solutions and analyze their strengths and weaknesses. MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY Reporting 14 Compile the research proposal on the management of identity access in information security. Delimitations of Research Several issues delimit the scope of the proposal. The research topic is management of identity access in information security. Delimitations are factors set by a researcher that limit the scope of a study. One delimitation is that the research participants will be information technology professionals working for various organizations in my city. Another delimitation is that there are other access control mechanisms, but I chose to research on role-based access control. The choice of role-based access control is because it has been in existence for years and that many organizations in the US are using it to comply with government regulations. In the study, my interests are on the management of identity access in information security. Other aspects, such as benefits and weaknesses, even though they will be covered, are not the focus of the research. The method for choosing the participants of the study is random sampling, and the participants are strictly information technology practitioners. Limitations of Research Some of the limitations to be experienced in carrying out this research include financial constraints. Lack of enough finances may significantly hinder the collection of data. MANAGEMENT OF IDENTITY ACCESS IN INFORMATION SECURITY 15 Literature Review Introduction This chapter provides summary of existing research studies, summary of existing theories, and summary of existing methods. It also provides literature review relevance to the research project, as well as key point Get a 10 % discount on an order above $ 100 Use the following coupon code : NURSING10
RECOMMENDED: Discuss two articles on information systems
With us, you are either satisfied 100% or you get your money back-No monkey business