Preview

Analysis Of BYOI: Bring Your Own Identity

Powerful Essays
Open Document
Open Document
1273 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis Of BYOI: Bring Your Own Identity
BYOI: Bring Your Own Identity

Introduction: Bring-Your-Own-Identity (henceforth “BYOI”) is one of the emerging trends among organizations which are in process of streamlining its IT governance solutions to make more flexible and mobile in nature. BYOI addresses the problem of registering/remembering multiple credentials for different applications and suggests to adopt/leverage open industry standards by means of integrating with social networking sites (E.g. Facebook, Google, Yahoo etc.).

Background and Business Driver: Bring-Your-Own-Device (BYOD) policy iss quite well known to all as this allows employees to bring in personalized devices like smart phones, tablet, even laptops to their workplace to access secure company information and applications. BYOD was successful as it resulted many advantages like increase in productivity, increased
…show more content…
The basic principle on which OpenID works is called “decentralized authentication” and its primary purpose is to establish “who you are”. It barres the third-party applications intending to integrate with OpenID supported identity provider from writing its own site-specific authentication logic. In this way, a user can login to multiple OpenID enabled website using a single existing social site userid/password combination. Under the hood, OpenID provider grants an URL like unique identifier to its users (E.g. Yahoo OpenID identifier would look like https://me.yahoo.com/a/uaStkHdgs_7BxVAc1FofG0xxxxxxxxxxxxxx.xxxxxck-) and the identifier is then matched once user authenticates to OpenID provider using the provider specific user credential. Point to be noted here, user would need to enter user ID and password in the provider Sign In page (say Yahoo! Sign In page) ONLY, not in any other application login page. Therefore, no website will ever see your password. Some market leading OpenID providers are Google, Yahoo!, Microsoft

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    Develop mobile device policies/procedure. Implement security safeguards based on policies/procedure documents. Make sure network is designed with mobile devices in mind.…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Better Essays

    What is BYOD? Bring your own device is where users, which may be students or employees, are empowered by their organizations to use their personal cell phones, tablets, and/or laptops for that…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Intel BYOD

    • 514 Words
    • 3 Pages

    Case : Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own devices was a fad - Could say no to devices.. As a company policy - Supporting BYOD Plan - Had a 48 hr web jam where employees can voice about the BYOD trend.. - Create a 5 tier model to manage security ○ Lv 1.. Stock movements ○ Lv 2.. Slightly confidential info like payroll ○ Lv 3- call basic and had the least permissive level of access to corporate data ○ Lv4- intermediate- consisted of applications pertaining to specific lines of busines ○ Lv5- Managed equivalent.. Was most permissive level of…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Effective BYOD Policy

    • 204 Words
    • 1 Page

    Identify which devices are permitted: What works for one organization might not work for others. If at an organization, the employees are provided company Blackberry device and computers for work, it is advised when considering a BYOD it can’t be expected that everyone will have a personal blackberry cell phone. It is feasible when other cell phones like Apple and Android are allowed. There should be specific policies identified for different OS. Since there are so many phone choices in the market.…

    • 204 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    For the past couple of years, a policy that allows employees to bring their own personal devices to work has become progressively popular. This policy is known as BYOD, an acronym that stands for “bring your own device”. One of the main reasons for the growing usage of the policy is the increase in employee productivity as they are already familiar with the equipment they are using at work. Although this reliance on technology is efficient and produces numerous benefits in the business sector, it also brings several problems along with it. Certainly, the risk of losing valuable data has become an imposing threat nowadays, making…

    • 1967 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Employees should have adequate rights to monitor employee use of equipment, such as laptops, tablets and cell phones issued for out-of office use because it is the company’s property designated for work purposes. There are several methods an employer can use to monitor use of company equipment. For instance, GPS tracking for company vehicles, Cell phone monitoring apps, and software to track computer usage. The employer has a right to know where its vehicle is, if it is driven safely, if the mileage is consistent with job duty. The employer also can access cell phone activity via apps. Again, the employer has a concern if the phone is being used excessively for other than work purposes that can be costly to the employer. Why should an employer have to pay rate charges for personal use? Finally, an employer can find monitoring software useful to decipher certain information or to track records and data.…

    • 297 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It seems everyone you meet these days, from students in elementary school to their great-grandparents, has a cell phone. In addition, most people have other electronic devices as well, including tablets, laptop computers, and MP3 players. These devises have inarguably made worldwide communication much easier. However, as is often the case, convenience has come with a price.…

    • 833 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    One kind of main benefits from ID management is that it enables people stand out in a sea of similar targets, to achieve this, people should create their own personal brand. Olins (2003) assert that brand is “a symbolic embodiment of all the information connected to a company, product or service.” Also, there is another view of the issue, that personal branding is a core value of their products and even beyond themselves, which blending with reputation, belief, concern and execution (Chris, 2003). In other words, personal branding is that gives people the ability to differentiate from the crowd. Therefore, the rapid growth of social media has provided certain chances for people to establish their own…

    • 1633 Words
    • 7 Pages
    Better Essays
  • Good Essays

    In both private and public sectors, organisations are building Information Technology infrastructure to improve their business capacity. There is a notable growth in the integration of organisations and forming of federations. This integration however is accompanied by some overhead for managing identities of employees, business partners, and customers, as the cost for dealing with the life cycle of user identities is very great. This is true because the relationship between an organisation and users can change often, and each change that occurs requires administration to act. This is also cumbersome for the individual if they are required to register a separate account for all the organisations that they access.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The recent breakthroughs in modern technology has been so rapid that even today’s generation who are highly dependent on gadgets and gizmos are overwhelmed with the options. Laptop computers no longer bear the weight and mobility problems that its predecessors used to have. Tablets are in abundance that it may even render laptops or netbooks obsolete. Even the ever so dependable smart phones are being develop to…

    • 553 Words
    • 3 Pages
    Good Essays