USING OF ADDITIONAL METHODS OF USER AUTHORIZATION
Journal Title: Scientific Journal of Astana IT University - Year 2020, Vol 4, Issue 4
Abstract
The article considers the methods of additional authorization of users of information systems, their advantages, and disadvantages, typical examples of usage. Multifactor authentication is becoming a standard tool for verifying the identity and access rights of information systems, from banking operations to access to enterprise databases. With the expansion of the spheres of use of various information systems, applications, and services, users of the systems get new opportunities, convenience, and mobility. But at the same time, there is a problem of secure and controlled access, authorization and identification of the user, confirmation of his authority. The options under consideration cannot be limited to service delivery alone: mechanisms could and should be used in various combinations. In addition to the analysis, experiments were carried out on implementing and testing additional authorization mechanisms, and feedback from end users was collected. Each of the methods was evaluated from many angles: ease of implementation, ease of use by the end user, availability, and adequacy of use. At the same time, there is no way to identify the optimal and universal method of additional authorization, since various service sectors have their own requirements for accessibility, reliability, and security. One can single out corporate services that provide data exchange, data processing or analytics, or remote management services industrial network management as the most promising areas for implementation. The authors analyzed the various methods most widely used in the security market, their capabilities, advantages, and disadvantages. The authors did not set the goal of nominating one selected mechanism as a priority; therefore, no recommendations are given to use a particular method.
Authors and Affiliations
B. Sultanova, A. Chsherbov
METHODS OF PROJECT-VECTOR MANAGEMENT OF EDUCATIONAL ENVIRONMENTS
Based on the developed mathematical model of the project-vector space, the methods of determining the endpoints of the objects of the project-vector space (PVS) and the calculation of the trajectory of the movement to...
SYSTEMATIC DATA PROCUREMENT IN AN OWL-EMBEDDED INFORMATION AND ANALYTICAL FRAMEWORK FOR THE MONITORING OF WATER RESOURCES IN THE ILE-BALKHASH BASIN
The world is facing an escalating water shortage crisis, with dire consequences for ecosystems, human health, and socio-economic development. This article explores the multifaceted nature of the water shortage problem of...
MULTIDIMENSIONAL DATABASES IN INFORMATION SYSTEMS OF UNIVERSITIES
The article is devoted to the description of the method of multidimensional database, which is an effective method of data storage, which allows analyzing data qualitatively, and most importantly in a short time. The a...
EFFECTIVE MANAGEMENT AND OPTIMIZATION OF BUSINESS PROCESSES
This article discusses the problems of introducing an effective business, as well as optimizing business processes. Various approaches to managing and optimizing business processes are analyzed. The reasons for which it...
DEPENDENCE OF COMPETITIVENESS ON THE LEVEL OF BUSINESS CONFIDENCE OF THE ENTERPRISE
The article deals with the issue of ensuring the competitiveness of construction contractors depending on the level of business confidence, which is esteemed as the amount paid on schedule construction contracts. To im...