USING OF ADDITIONAL METHODS OF USER AUTHORIZATION
Journal Title: Scientific Journal of Astana IT University - Year 2020, Vol 4, Issue 4
Abstract
The article considers the methods of additional authorization of users of information systems, their advantages, and disadvantages, typical examples of usage. Multifactor authentication is becoming a standard tool for verifying the identity and access rights of information systems, from banking operations to access to enterprise databases. With the expansion of the spheres of use of various information systems, applications, and services, users of the systems get new opportunities, convenience, and mobility. But at the same time, there is a problem of secure and controlled access, authorization and identification of the user, confirmation of his authority. The options under consideration cannot be limited to service delivery alone: mechanisms could and should be used in various combinations. In addition to the analysis, experiments were carried out on implementing and testing additional authorization mechanisms, and feedback from end users was collected. Each of the methods was evaluated from many angles: ease of implementation, ease of use by the end user, availability, and adequacy of use. At the same time, there is no way to identify the optimal and universal method of additional authorization, since various service sectors have their own requirements for accessibility, reliability, and security. One can single out corporate services that provide data exchange, data processing or analytics, or remote management services industrial network management as the most promising areas for implementation. The authors analyzed the various methods most widely used in the security market, their capabilities, advantages, and disadvantages. The authors did not set the goal of nominating one selected mechanism as a priority; therefore, no recommendations are given to use a particular method.
Authors and Affiliations
B. Sultanova, A. Chsherbov
ASSESSING LTE TECHNOLOGY INTERFERENCE PARAMETERS
The article is devoted to experimental estimation of interference parameters. The article discusses LTE technology, the main parameters and services of LTE technology, and calculates the internal parameters. Introduction...
USING OF ADDITIONAL METHODS OF USER AUTHORIZATION
The article considers the methods of additional authorization of users of information systems, their advantages, and disadvantages, typical examples of usage. Multifactor authentication is becoming a standard tool for...
INFORMATION-ANALYTICAL SYSTEM FOR EVALUATING THE SCIENTIFIC PERFORMANCE OF STRUCTURAL UNITS OF UNIVERSITIES AND RESEARCH INSTITUTES BASED ON THE APPROACH OF CONSTRUCTING COMPLEX INTEGRAL EVALUATION
The article discusses the creation of an information-analytical system for evaluating the scientific performance of structural units of universities and research institutes based on the approach of constructing complex...
MODEL OF STRATEGIC ANALYSIS OF FORMATION AND ADMINISTRATION OF INVESTMENT ACTIVITY OF STOCKHOLDER CONSTRUCTION COMPANY
The article analyzes the market position of construction companies and builds a justification for updated methodological and analytical tools for evaluating, selecting, and building a productive system of portfolio adm...
DEVELOPMENT OF A DATABASE OF DIGITAL MULTICULTURAL CONTENT AND APPLICATION IN JOURNALISM LESSONS
The development of digital technologies stimulates changes in the field of education, including for students of the educational programs «Digital Journalism» and «Media Technologies». This paper presents the practice o...