Who, what, why, where - and when [information security]

Access Full Text

Who, what, why, where - and when [information security]

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Engineering & Technology — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this paper, security of information is discussed. The problem of offsetting data security against accessibility has proved a ubiquitous problem of the last decade. As the range of software that users have to work with has broadened and security's remit has become enlarged, IT administrators have struggled to keep control of system and application access without complicating the login process. Identity access management (IAM) software has emerged as an important tool for administrators trying to regain control. Research firm Gartner has estimated that companies are spending roughly 8 per cent of their data security budget on IAM tools. These encompass many elements: user provisioning, Web access management, role-based access, and single sign-on tools are the most popular, with privileged account and entitlement management perhaps the most critical.

Inspec keywords: biometrics (access control); authorisation; software engineering; Web sites

Other keywords: role-based access; entitlement management; identity access management software; Web access management; IAM tools; access control; data security; login process; ubiquitous problem; single sign-on tools

Subjects: Data security; Software engineering techniques

http://iet.metastore.ingenta.com/content/journals/10.1049/et.2011.0602
Loading

Related content

content/journals/10.1049/et.2011.0602
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading