• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

NIST SP 800 63-3 “Digital Identity Guidelines”

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 5a - Access Control Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 8:44 pm

    Authentication: The guide may address how to verify an individual’s digital identity to ensure its authenticity and trustworthiness. This may include the use of passwords, biometrics, multi-factor authentication, etc.
    Privacy protection: Digital identity guidelines generally emphasize the importance of protecting an individual’s privacy, including how personally identifiable information is collected, stored, and used. These guidelines may require organizations to comply with data protection regulations and restrict access to sensitive information.
    Security and resilience: Digital identity systems need to be able to withstand security threats such as cyber attacks and data breaches. Guidance may include how to design and implement security protocols, encryption technologies, and authentication mechanisms to ensure the security of digital identities.
    Interoperability: In order to achieve seamless authentication between different systems and platforms, digital identity guidelines may promote standardization and interoperability. This includes developing common protocols, data formats, and interface standards so that different organizations and services can collaborate with each other and share identity information.
    Compliance and legal framework: The guidance may address legal and regulatory requirements related to digital identity, including data protection regulations, privacy policies and identity authentication provisions. Organizations need to follow these legal and regulatory requirements to ensure the legality and compliance of their digital identity systems.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 8:31 pm

    The article provides comprehensive guidance for federal agencies to implement digital identity services. It covers identity proofing, authentication, and federation, aiming to enhance the security and privacy of digital transactions. The guidelines emphasize a risk-based approach to selecting assurance levels for identity services, breaking down the traditional level of assurance (LOA) into separate components for more flexibility and precision in managing digital identity risks. The document advocates for privacy-enhancing technologies and minimal personal information collection, promoting pseudonymous access to services where possible.
    The key point is digital identity services. (1)Identity Proofing (IAL): This refers to the process used to establish the identity of an individual. The robustness of the identity proofing process is critical to confidently determine an individual’s identity and to mitigate potential errors in identity proofing. Errors in this process can lead to unauthorized access or identity theft, hence the need for a thorough and reliable method to prove an individual’s identity. (2)Authentication (AAL): Authentication is the process by which an individual proves their identity to a system, typically through the use of one or more authenticators (e.g., passwords, biometrics). The AAL focuses on the strength of the authentication process itself, including how well an authenticator is bound to an individual’s identifier. The goal is to mitigate potential authentication errors, such as when a false claimant attempts to use a credential that does not rightfully belong to them. (3)Federation (FAL): Federation involves the use of a single identity across multiple systems or services, allowing for a seamless user experience and more efficient identity management across different platforms. The FAL assesses the robustness of the assertion protocol used by the federation to communicate authentication and attribute information to a Relying Party (RP).

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in