Are you looking this product? Now you can get product in Kindle Format,just following step by step until finish you will be guided downloading this book for free, Enjoy it.
Ask a dozen information technology administrators and engineers what Identity Management is and you'll get two dozen answers. It doesn't need to be complicated. Think of identity management as an office building. Not everyone can go into every room within the building, and not everyone can go into all the filing cabinets even if they are permitted to enter the room. Each person has a key that allows that person to access the rooms that the person is allowed to access. No more and no less.
Better yet, think of it as a posh hotel. When you get the "key" at the front desk, it allows you to enter your room, the indoor gym, the indoor swimming pool area, and the business center. It does not permit you access to the Janitor's closet, other rooms in the hotel, or the kitchen. You need a different key for that. You only have permission to enter certain areas that are defined by management.
Similarly, a computer network is like the hotel, and each guest room represents a file, database, or application on that network. The employees working in the hotel are the users. The keys are the rights and privileges that the administrator doles out to each person on the network. These rights provide access to a file, application, or database. The keys (rights and privileges) also determine what the users can do while accessing a file or application.
Like hotel security, identity management is the most essential form of information protection that agencies and companies use. Yet, it is also among the least used or improperly implemented of all information security practices.
Password Plus
Identity management is more than simply permitting a user to log on; identity management controls what users can do, similar to putting the locks on the doors and walls inside the hotel. In other words, IdM is more than giving rights to a user so he or she can log on. An administrator assigns a credential, such as a number, to a worker. That credential/number gives the worker access to the network and determines what resources are made available. That credential can also alert the administrator if the user is accessing forbidden areas. Security personnel are also aware of actions that could trigger an alert based on actions that indicate a person is attempting access into prohibited areas.
In its basic form, identity management is requiring a user to enter a username and password. Building on that, identity management incorporates the science of biometrics to identify a user, as well as to approve/deny access to resources within an organization or agency.

0 comments:
Post a Comment