USING OF ADDITIONAL METHODS OF USER AUTHORIZATION
Journal Title: Scientific Journal of Astana IT University - Year 2020, Vol 4, Issue 4
Abstract
The article considers the methods of additional authorization of users of information systems, their advantages, and disadvantages, typical examples of usage. Multifactor authentication is becoming a standard tool for verifying the identity and access rights of information systems, from banking operations to access to enterprise databases. With the expansion of the spheres of use of various information systems, applications, and services, users of the systems get new opportunities, convenience, and mobility. But at the same time, there is a problem of secure and controlled access, authorization and identification of the user, confirmation of his authority. The options under consideration cannot be limited to service delivery alone: mechanisms could and should be used in various combinations. In addition to the analysis, experiments were carried out on implementing and testing additional authorization mechanisms, and feedback from end users was collected. Each of the methods was evaluated from many angles: ease of implementation, ease of use by the end user, availability, and adequacy of use. At the same time, there is no way to identify the optimal and universal method of additional authorization, since various service sectors have their own requirements for accessibility, reliability, and security. One can single out corporate services that provide data exchange, data processing or analytics, or remote management services industrial network management as the most promising areas for implementation. The authors analyzed the various methods most widely used in the security market, their capabilities, advantages, and disadvantages. The authors did not set the goal of nominating one selected mechanism as a priority; therefore, no recommendations are given to use a particular method.
Authors and Affiliations
B. Sultanova, A. Chsherbov
USE OF THE LINK RANKING METHOD TO EVALUATE SCIENTIFIC ACTIVITIES OF SCIENTIFIC SPACE SUBJECTS
A modification of the PageRank method based on link ranking is proposed to evaluate the research results of subjects of the scientific space, taking into account selfcitation. The method of reducing the influence of sel...
FORECASTING CUSTOMER FUTURE BEHAVIOR IN RETAIL BUSINESS USING MACHINE LEARNING MODELS
The ability to forecast customers’ future purchases, lifetime value, and churn are fundamental tasks in business management. These tasks become more complicated when the relationship between customers and business is n...
FUNCTIONAL MODEL OF ORGANIZATION DEVELOPMENT BASED ON QUALITY MANAGEMENT IN AN EDUCATIONAL ORGANIZATIONAS A QUALITY ASSURANCE TOOL
In the context of the formation of an innovative economy, great attention in management in recent years has been paid to the problems of mastering and implementing the management of an organization based on quality. Qu...
RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91
The proposed article is devoted to the investigation of quantum key distribution protocols. The idiosyncrasy of this theme lies within the truth that present day strategies of key distribution, which utilize classical...
METHODS OF NAVIGATING ALGORITHMIC COMPLEXITY: BIG-OH AND SMALL-OH NOTATIONS
This article provides an in-depth exploration of Big-Oh and small-oh notations, shedding light on their practical implications in the analysis of algorithm complexity. Big-Oh notation offers a valuable tool for estimatin...