Authentication and Authorization Methodologies

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

10 January 2022

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

101 writers online

Authentication and Authorization Methodologies

Authentication and Authorization MethodologiesIn our generation digital setting is extremely vulnerable to attacks similar to hackers and spammers. Therefore, implementing authentication and authorization are the most very important components ought to be put in place in phrases of the security of knowledge. The system meant for authentication function in any organization have to be integrated in a manner that guarantees customer’s safety of their knowledge. Organizations led by Chief Executive Officer (CEO), Chief Information Officer (CIO) along with their staff of staffs have a higher responsibility of creating use of authentication and authorization as a prime prior to make sure safety of the databases.

, this could presumably be organization’s planning/management data, their client’s data or partners. This context focuses on options for the authentication and authorization methodologies but significantly for the Navy Federal Credit Union the organization of alternative and eventually, recommend on how to mitigate the impacts of dangers from vulnerabilities.

Roles of Employed by Navy Federal Credit Union Regarding Data Security.

Accounts existence are scattered across the internet. Each and every a kind of accounts is has potential vulnerability to assaults and might interfere with confidentiality of very important data. The Navy Federal Credit Union has employed creation of distinctive username and password when customers are creating their accounts. Their techniques additionally incorporate password reset as nicely as change of username in case one has forgotten any of the later or suspects information leak. Moreover, the organization guarantee their ATM’s utilized by their clients are safe from phishing and others attacks.

Their entrusted staffs are ever alert and continuously keep monitoring systems for attainable suspicious prevalence.

Common Attacks Against Access Control Methods

Although Navy Federal Credit Union has put in place security measures to control entry of data as defined above, there are still vulnerabilities. For instance, they haven’t but established a formal password policy that is ready to meet the organization’s regulatory requirement. Instead, makes it optional for its shoppers to choose on their passwords that are at occasions inconvenient and unreliable as a outcome of their weak status. Moreover, the group uses a single-factor authentication which compromises the clients’ private information such as the social security quantity, earnings, account transaction cost history, account info and account steadiness. The Navy Federal Credit Union makes use of a single Sign-On know-how where the user is assigned into a single display screen name which leads to the logging in or unlocking of multiple webpages/sites and functions. Integrated techniques with the ability to watch the accessibility or permissions attracts vulnerability to attack as a end result of the use of single authentication protocol. For instance, the system incorporate password reset function, unauthorized particular person would possibly gat a possibility to predict a current or future password in the process of adjusting it via single authentication. It has been confirmed that regular changing of passwords does extra harm than good, furthermore, this act is ineffective as a means of securing knowledge.

Countermeasures to Reduce Vulnerabilities and Mitigate Potential Attacks on Access Methods.

Two-factor authentication is greatly recommended where an account is secured by two totally different locks with different factors earlier than access is granted. Rather than the password, the two-factor authentication provides an added safety. It may be a selection of questions which need to be supplied with the best solutions in order to validate the actual account proprietor. An SMS message can be despatched to your phone number, as a secret key. The group must also put in place a password policy within the context of mandatory password expiration to increase the security (Wanger et al., 2015).

All the servers in the group should use Active networks as they involve fast dynamics of varying component configuration due to the downloading and performing of Active Applications (AAs). These changes are required to be automated to have the ability to launch an AA, however, the system that automates configuration should also be updated as new AA is launched. Conclusively, the self-configuring network automates configuration administration (Kim, 2013).

The Navy Federal Union ought to react in ad-hoc trend with a response plan in the aim of limiting knowledge breach as much as potential. The Computer Security Incidence Response Team (CSIRT) can as nicely coordinate response effort by way of a selection of methods together with the identification of target attacks. Determining the threat severity by way of Geo IP providers, intelligence and status feed and Virus Total. Verifying the infection if any and at last containing the risk (Tondel et al., 2014)


Globally, organizations encounter various dangers associated with different threats, regardless of the nature or state of menace, it’s up to the administrators of the group to responsibly restrict and comprise the dangers from respective threats. With the objective of improving IT security via vulnerability administration, the Navy Federal Union or some other organizations should determine their scope. Identify the asset house owners, handle expectations, work with single authoritative source and finally formulate insurance policies, enterprise, techniques and clients are better protected when there might be nicely built-in vulnerability administration process


  1. Kim, H., & Feamster, N. (2013). Improving network management with software outlined networking. IEEE Communications Magazine, 51(2), 114-119.
  2. Tondel, I. A., Line, M. B., & Jaatun, M. G. (2014). Information security incident management: Current practice as reported within the literature. Computers & Security, forty five, 42-57.
  3. Wang, D., He, D., Wang, P., & Chu, C. H. (2015). Anonymous two-factor authentication in distributed systems: certain goals are past attainment. IEEE Transactions on Dependable and Secure Computing, 12(4), 428-442.
Cite this page

Authentication and Authorization Methodologies. (10 January 2022). Retrieved from

"Authentication and Authorization Methodologies" StudyScroll, 10 January 2022,

StudyScroll. (2022). Authentication and Authorization Methodologies [Online]. Available at: [Accessed: 26 September, 2023]

"Authentication and Authorization Methodologies" StudyScroll, Jan 10, 2022. Accessed Sep 26, 2023.

"Authentication and Authorization Methodologies" StudyScroll, Jan 10, 2022.

"Authentication and Authorization Methodologies" StudyScroll, 10-Jan-2022. [Online]. Available: [Accessed: 26-Sep-2023]

StudyScroll. (2022). Authentication and Authorization Methodologies. [Online]. Available at: [Accessed: 26-Sep-2023]

Don't use plagiarized sources. Get your custom essay..

get custom paper

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy.