Preview

Nt1310 Unit 1 Lab 2

Satisfactory Essays
Open Document
Open Document
473 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 1 Lab 2
Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly …show more content…

How does OAuth 1 or OAuth 2 impact the bottom line cost to a corporation versus the impact to the client and their privacy? By conducting a quantitative research study, I will survey the top 10 most popular websites based on number of users and document which protocol they use, how much money is spent on implementing cybersecurity measures and finally, how OAuth 1 or OAuth 2 affects the consumer. I will catalog how OAuth 1 or OAuth 2 affects the client by determining how often the user’s personal information is unwillingly

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 4

    • 313 Words
    • 2 Pages

    1) Block B in Fig. 6-31 weighs 603 N. The coefficient of static friction between block and table is 0.32; angle θ is 33°; assume that the cord between B and the knot is horizontal. Find the maximum weight of block A for which the system will be stationary.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT1310 Unit 9 Lab 1

    • 1254 Words
    • 4 Pages

    The new structure has been given a grant to make its network state of the art by making it a fiber optic network. The topics of discussion that will be mentioned in this paper are the hardware that will be necessary for the inside and outside of the building and how we would expand the fiber to an adjacent building if it is built. Another topic to be discussed will be describing the safety procedures that will be following during the installation.…

    • 1254 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 4 Lab

    • 370 Words
    • 2 Pages

    Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…

    • 370 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 5

    • 368 Words
    • 2 Pages

    the ratio of resistors on one side of the bridge is one while the ratio of resistors on the other side is infinity…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 3

    • 472 Words
    • 2 Pages

    Fill in the blanks in the following table. Then use the table to answer the questions:…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    The ability for organizations to control and customize security features in cloud-based productivity services, such as email, calendars, content management, collaboration, and unified communications, is becoming an essential requirement for virtually every company. Today, IT teams are being required to deliver access to productivity services and associated documents and data from more devices, platforms, and places than ever before. While user benefits are undeniable, broader access makes security management more challenging. Each endpoint represents a potential attack surface and another point of…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Sanhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    The students will research best practices for private sector and public sector authentication as it relates to e-commerce and on-line banking. Then they will research the best practices for remote access for employees through public Internet and for employees of city, county, state, and federal governments, based on DoD standards for secure remote access. Multi-factor authentication and restrictions based on data types and sensitivity as discussed in previous labs are major considerations for this research when investigating RADIUS, TACACs+ and WLAN authentication methodologies.…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Password Cracking

    • 794 Words
    • 4 Pages

    References: Dinei Florencio and Cormac Herley; Microsoft Research. (2007). A Large-Scale Study of Web Password…

    • 794 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    ipad Authors: Shelly Palmer, Bob Gourley, Security Gateways Related Topics: C EOs in Technology, iPhone Developer, APC Journal, iPhone for Business, Philippines, Twitter on Ulitzer, PR on Ulitzer, New Media on Ulitzer, Facebook on Ulitzer, Marketing and Sales, Wine Blog on Ulitzer, The Social Media Guide, Outsourcing on Ulitzer, iPhone Apps on Ulitzer, iPad on Ulitzer, iPad For Business, The Role of Business…

    • 2610 Words
    • 11 Pages
    Satisfactory Essays
  • Best Essays

    Hole, K.J., Moen, V., Tjøstheim, T.: Case study: Online banking security. IEEE Security & Privacy 4(2) (2006).…

    • 2660 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Disertation

    • 10208 Words
    • 41 Pages

    3. Antonopoulos, A. (2007) "OpenID: User-centric identity", Network World, vol. 24, no. 10, pp. 21.…

    • 10208 Words
    • 41 Pages
    Powerful Essays
  • Powerful Essays

    Internet Security

    • 1915 Words
    • 8 Pages

    Over the last decade, the Internet has put the rest of the world at reach because of computers. In the same way it also made computers more reachable by the rest of the world as well. The Internet is subject to widespread attacks ranging from worms, hackers, spoofing, spam, and phishing; just to name a few. Every computer device is susceptible and vulnerable to security attacks and those attacks can be just as detrimental to an organization as it is to an individual. Organizations of all sizes want and need to secure their network connectivity to their data and applications because of the need to collaborate both inside and outside the organization. Because of the security risk vulnerability it poses, organizations need requirements established to maintain its integrity for all its valuable data. Not only is information security important to an organization but also its information is valuable to its consumers who information that it must protect.…

    • 1915 Words
    • 8 Pages
    Powerful Essays