Authentication administration practices research paper sample


Discuss ways that an organization may streamline the administration required to implement and maintain a strong authentication solution.

Organizations are currently faced with many challenges in relation to implementing and maintaining strong authentication solutions. Many industries have realized that the use of user IDs and passwords do not fully authenticate their users in relation to data protection. In order for an organization to meet the business regulatory mandates and requirements for data protection, implementing strong authentication systems using sophisticated ways of identifying users is the only option. According to Anderson (2008), development of a strong authentication strategy creates a strong defense tool that an organization can use to secure its data. Understanding human psychology has enabled experts in computer security manage people through developing strong authentication systems.
For example, an organization might use Knowledge-Based Authentication (KBA). This method utilizes the ability of an individual to give the correct answer that assists in protecting online applications. KBA has many benefits to an organization. First, it improves security an organization by eliminating the use of passwords. Secondly, it assists managers in identifying themselves in an industry therefore, improving user productivity and convenience using automatic logging systems. In addition, this type of authentication enables an organization to open up business opportunities through reduced risks. It assists in fostering safe connection between different partners and customers (Anderson, 2008).
Organizations use internet-enabled applications that enable employees and customers’ access information through their personal computers and mobile phones. According to Symantec Corporation (2011; 18-19), organizations need to come up with fraud detection systems that suspect any unwanted authentication into the company’s accounts. Symantec Corporation gives a solution of evaluating the company’s software-as-a-service application deployment. This solution enables an organization maintain high security standards for their information by providing total protection from data loss through hacking. Moreover, the system protects consumers through using strong authentication processes preventing unauthorized access.

Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems

The Second Edition. New York: John Wiley & Sons Publishing, Inc.
Symantec Corporation. (2011). 5 Essential Steps for Implementing Strong Authentication in the

Enterprise. Retrieved from:
http://www. altimate-group. fr/blobs/com. cardiweb. cardiboxv6. cm. business. Article/2022234026881869033/file/1/whitepaper-strong-authentication-steps. pdf