• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

NIST SP 800 63A “Digital Identity Guidelines Enrollment and Identity Proofing”

January 1, 2022 by Jose Gomez 2 Comments

Filed Under: 5a - Access Control Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 8:50 pm

    The registration process involves capturing and storing the identifying information of an individual or entity. This typically includes basic personal details, contact information, and authentication credentials (e.g., password, pin).
    Proof of identity is the process of verifying the authenticity of an individual’s claimed identity. It involves verifying the identity information provided during the registration process according to a reliable and trusted source.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 11:23 pm

    This article outlines the process of collecting, validating, and verifying identity evidence for applicants at various Identity Assurance Levels (IALs). The document emphasizes the importance of ensuring the authenticity and accuracy of identity information to prevent fraud and enhance the security of digital identities. It also details the responsibilities of Credential Service Providers (CSPs) in maintaining accurate enrollment records and securely binding authenticators to these records.
    About the processes of resolving, validating and verifying an individual’s identity and the associated evidence. There are some requirements aimed at ensuring that the claimed identity matches the actual identity of the individual attempting to enroll with a Credential Service Provider (CSP). This is crucial for preventing scalable attacks that could impact a large number of enrolled individuals, thereby necessitating that the cost and effort to execute such attacks outweigh the potential benefits.
    Identity resolution, a key component of these guidelines, focuses on uniquely identifying an individual within a specific population or context. This involves using the minimal set of necessary attributes to distinguish an individual uniquely. Effective identity resolution serves as a crucial starting point in the identity proofing process, enabling the initial detection of potential fraud. However, it’s important to note that identity resolution alone does not constitute a complete and successful identity proofing transaction​​.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in