ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Business Impact of Identity Management In Information Technology

Journal: International Journal of Modern Research in Engineering and Technology (Vol.1, No. 3)

Publication Date:

Authors : ; ;

Page : 51-53

Keywords : Identity management; provisioning; access control; credential; user name; password; directory service; federated identity; phishing; identity theft;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

This paper explains the importance of data security through identity management. Businesses must do everything practical to protect their data and IT systems from malicious parties. Hackers have many tools and methods at their disposal, such as phishing, to steal identity data and compromise IT systems for malicious purposes. Even failures by an organization's own IT department to protect against malicious use from its own employees have resulted in significant financial losses. These losses could have been prevented had adequate identity management steps been taken. Usage of technologies such as a centralized Identity Management System, Directory Services, or Federated Identity Management protect a user's private information and effectively control access to business systems. Many core IT business systems and cloud service providers can leverage these identity management technologies to provide data security and secure access control.

Last modified: 2018-08-25 16:37:40