How to Manage Large Numbers of Usernames and Passwords Within an Enterprise
Total Page:16
File Type:pdf, Size:1020Kb
“How to Manage Large Numbers of Usernames and Passwords within an Enterprise”
Research Proposal Research Proposal 2
Table of Contents
Chapter 1: Introduction…………………………………………………………….3
Historical Background…………………………………………………...3
Purpose…………………………………………………………………..3
Chapter 2: Context of the Problem…………………………………………………4
Problem Statement…………………………………………………….....4
Chapter 3: Significance and Impact………………………………………………..5
Chapter 4: Research Design Methodology………………………………………....5
Research Questions and Theoretical Solutions…………………………...5-6
Conclusion…………………………………………………………………………….7
References…………………………………………………………………………….8
Research Proposal 3
Chapter 1: Introduction
The introduction of this research will give a brief insight as to
how quick an enterprise organization can go from a small amount of
access credentials (usernames and passwords) for network resources to
large amounts of them due to an organization’s growth. Within this
chapter, it will also cover the historical background (how the problem
first came to light) and the purpose (reason for the research) (Ormancy,
2008).
Historical Background
This chapter will provide the reader with insight into how the
problem first appeared and origins. It will also further describe how
technological advancements have contributed to the problem as an
enterprise grows at an exponential rate. Within this chapter, it will also
cover why usernames and passwords exist and in what ways usernames
and passwords have become time consuming, costly, and an
administrative burden (Bhattacharya, Chhaware, & Pandy, 2013).
Purpose
This chapter describes the objectives of the research to be performed with
regards as to how to minimize large usernames and passwords within enterprises. The
chapter also explains why this research needs to be performed and what is to be gained
from performing such research. In addition, this chapter will briefly touch on how
potential solutions were founded and how knowledge was gained from the research Research Proposal 4
(Burr, 2013).
Chapter 2: Context of the Problem
This chapter will provide a clear description of the environment in
which managing large usernames and passwords is an issue. It will also
identify the organizations and entities to which this problem does not
pertain, along with reasons why the problem is not an issue within their
realm. Lastly, it will describe and define what is meant by “Large
Numbers of Usernames and Passwords” and what is meant by the term
“Enterprise” used in a technological context (Wurzler, 2013).
Problem Statement
This chapter provides the reader with an understanding of the
problem that is the focus of the research being performed. The chapter
presents a formal description in a succinct (one sentence delivery),
followed by a series of descriptions, and examples of the problem. This
chapter will also provide a lead-in to the next two chapters that discuss
the impact and significance of the subject matter, the potential gains as a
direct result of research, and impact on those stakeholders that would
benefit most from a solution to the problem (Andersson, 2013). Research Proposal 5
Chapter 3: Significance and Impact
Within this chapter, significance of practice and impact will
present the reader with a detailed point of view of the problem as
described in the previous chapter. The study is one of practice due to
credentialed access being one that is used on an everyday basis (Schmidt,
2011). The impact is presented in a way that conveys to the reader as to
how to manage such issues with large credentialed access to keep the
issue from hindering the organization as well as the employees (NISO,
2011).
Chapter 4: Research Design Methodology
This chapter presents a list of the methods employed during
research, and whether the research is focused primarily on quantitative or
qualitative methods and why (Gerdes, 2008) and (Hillegersberg &Smits,
2013). A discussion of the difference between qualitative and
quantitative methodologies is presented so that the reader understands the
strengths and weaknesses of both and can then better understand why
both methods were employed for this research (Gerdes, 2008). Each
component of the research design methodology is presented and
discussed in full so that the reader thoroughly understands the reasoning
behind the design chosen for this research.
Research Questions and Theoretical Solutions
As the title implies, this chapter presents the questions that the Research Proposal 6 research will attempt to answer about the problem and the potential solutions for which the research is expected to provide (Stoneburner,
2002). Each question is listed separately within the chapter along with a detailed description that provides the reader with a concrete understanding of the significance of each question, the answer, and the evidence confirming or refuting the research done (Burr, 2013). Research Proposal 7
Conclusion
Since organizations have stopped using manual writing and
started using technology to keep up with things, it required credentialed
access for all network resources to protect employees, clients, and the
organization’s privacy. With this type of upgrade, many issues came
about with the use of different usernames and passwords for each
network. Therefore, this conclusion will summarize the findings, the
evidence, and recommendations as to how to minimize large usernames
and passwords within a large enterprise/or organizational setting
(Ormancy, 2008). Research Proposal 8
References
Andersson, D., (2013). Authentication with passwords and passphrases- Implications on usability and security. Lunds University, Department of Informatics, p. 4-11.
Bhattacharya, A., Chhaware, S.P., & Pandy, S.B. (2013). A survey on distributed network services using sso for secure mechanism. International Journal of Research in
Computer and Communication Technology, Vol 2, Issue 10, October, 2013.
Burr, W. (2013). Electronic authentication guideline, NIST Special
Publication 800-63-2, U.S. Department of Commerce.
Gerdes, J. (2008). Multi-dimensional credentialing using veiled certificates: Protecting the privacy in the face of regulatory reporting requirements. Computers and Security, Vol. 28, p. 248 – 259.
Hillegersberg, J., & Smits, D., (2013). The continuing mismatch between it governance, theory, and practice: Results from a delphi study with cio's.
University of Twente’.
NISO, (2011). ESPReSSO: establishing suggested practices regarding single sign-on.
NISO, Baltimore, MD.
Ormancy, E, (2008). CERN single sign-on solution. Journal of Physics.
IOP Publishing, Conference Series 119, p. 1-2.
Schmidt, (2011). Illiad, cas, shibboleth, and php: the road to single sign-on. University of South Florida Academic Services Faculty and Staff Publications, Tampa Library.
Stoneburner, (2002). Risk management guide for information technology systems. NIST Special Publication, 800-30.
Wurzler, J., (2013). Information risks and risk management. SANS Institute, p. 2-4. Research Proposal 9