5 Feb 2023

77

The Open Identity Web Systems (OIWS)

Format: APA

Academic level: High School

Paper type: Assignment

Words: 259

Pages: 1

Downloads: 0

Convenience and Security of Open ID 

The current system is not convenient since different sites identify their users differently. Besides, it relies on singular credentials such as similar username or password to access the system, making it unreliable for various sites with users of similar identity. On the other hand, Open ID provides the user with the ability to authenticate into different websites with single identity without registering for every site and finds complete control (FSCJ, 2018) . Moreover, the users can choose the identity provider to trust and build up their own. 

The current system encounters security problems since most of its sites are not ready to focus on security. Similarly, granting authentication access to the system basing on users’ credentials provides a potential risk of easy trespass into the system (Laudon, & Laudon, 2016). Conversely, Open ID is secure because only one site is trusted with access secrets that one can make a choice. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Accessing Web Content by Identity Provider 

I fully consider an identity provider to access content on the Web due to its convenience and security factors. Identity provider saves the users ’ personal information that the system users trust it to remember securely. Furthermore, the identity provider determines a singular identity to the target user, allowing them to control their identification fully (FSCJ, 2018) . Also, it is a relying party that enables users to sign in the web system after a moment of interrogation with the user, which proves the viability of the provided details to the user. Finally, an identity provider avails the ability to access the various numbers of systems with a centric control of personal credentials and multiple choices to the identity providers. 

References 

FSCJ, J. (2018). ISM4011 Module 5 - Open ID According to Dave. Retrieved from https://www.youtube.com/watch?v=AdJ7S1hAjuk&feature=youtu.be 

Laudon, K. C., & Laudon, J. P. (2016).  Management information system . Pearson Education India. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). The Open Identity Web Systems (OIWS).
https://studybounty.com/the-open-identity-web-systems-oiws-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 97

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 135

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration