<p>“How to Manage Large Numbers of Usernames and Passwords within an Enterprise”</p><p>Research Proposal Research Proposal 2</p><p>Table of Contents</p><p>Chapter 1: Introduction…………………………………………………………….3</p><p>Historical Background…………………………………………………...3</p><p>Purpose…………………………………………………………………..3</p><p>Chapter 2: Context of the Problem…………………………………………………4</p><p>Problem Statement…………………………………………………….....4</p><p>Chapter 3: Significance and Impact………………………………………………..5</p><p>Chapter 4: Research Design Methodology………………………………………....5</p><p>Research Questions and Theoretical Solutions…………………………...5-6</p><p>Conclusion…………………………………………………………………………….7</p><p>References…………………………………………………………………………….8</p><p>Research Proposal 3</p><p>Chapter 1: Introduction</p><p>The introduction of this research will give a brief insight as to </p><p> how quick an enterprise organization can go from a small amount of </p><p> access credentials (usernames and passwords) for network resources to </p><p> large amounts of them due to an organization’s growth. Within this </p><p> chapter, it will also cover the historical background (how the problem </p><p> first came to light) and the purpose (reason for the research) (Ormancy, </p><p>2008).</p><p>Historical Background</p><p>This chapter will provide the reader with insight into how the </p><p> problem first appeared and origins. It will also further describe how </p><p> technological advancements have contributed to the problem as an </p><p> enterprise grows at an exponential rate. Within this chapter, it will also </p><p> cover why usernames and passwords exist and in what ways usernames </p><p> and passwords have become time consuming, costly, and an </p><p> administrative burden (Bhattacharya, Chhaware, & Pandy, 2013).</p><p>Purpose </p><p>This chapter describes the objectives of the research to be performed with </p><p> regards as to how to minimize large usernames and passwords within enterprises. The </p><p> chapter also explains why this research needs to be performed and what is to be gained </p><p> from performing such research. In addition, this chapter will briefly touch on how </p><p> potential solutions were founded and how knowledge was gained from the research Research Proposal 4</p><p>(Burr, 2013).</p><p>Chapter 2: Context of the Problem</p><p>This chapter will provide a clear description of the environment in</p><p> which managing large usernames and passwords is an issue. It will also </p><p> identify the organizations and entities to which this problem does not </p><p> pertain, along with reasons why the problem is not an issue within their </p><p> realm. Lastly, it will describe and define what is meant by “Large </p><p>Numbers of Usernames and Passwords” and what is meant by the term </p><p>“Enterprise” used in a technological context (Wurzler, 2013). </p><p>Problem Statement </p><p>This chapter provides the reader with an understanding of the </p><p> problem that is the focus of the research being performed. The chapter </p><p> presents a formal description in a succinct (one sentence delivery), </p><p> followed by a series of descriptions, and examples of the problem. This </p><p> chapter will also provide a lead-in to the next two chapters that discuss </p><p> the impact and significance of the subject matter, the potential gains as a </p><p> direct result of research, and impact on those stakeholders that would </p><p> benefit most from a solution to the problem (Andersson, 2013). Research Proposal 5</p><p>Chapter 3: Significance and Impact</p><p>Within this chapter, significance of practice and impact will </p><p> present the reader with a detailed point of view of the problem as </p><p> described in the previous chapter. The study is one of practice due to </p><p> credentialed access being one that is used on an everyday basis (Schmidt,</p><p>2011). The impact is presented in a way that conveys to the reader as to </p><p> how to manage such issues with large credentialed access to keep the </p><p> issue from hindering the organization as well as the employees (NISO, </p><p>2011). </p><p>Chapter 4: Research Design Methodology</p><p>This chapter presents a list of the methods employed during </p><p> research, and whether the research is focused primarily on quantitative or</p><p> qualitative methods and why (Gerdes, 2008) and (Hillegersberg &Smits, </p><p>2013). A discussion of the difference between qualitative and </p><p> quantitative methodologies is presented so that the reader understands the</p><p> strengths and weaknesses of both and can then better understand why </p><p> both methods were employed for this research (Gerdes, 2008). Each </p><p> component of the research design methodology is presented and </p><p> discussed in full so that the reader thoroughly understands the reasoning </p><p> behind the design chosen for this research. </p><p>Research Questions and Theoretical Solutions</p><p>As the title implies, this chapter presents the questions that the Research Proposal 6 research will attempt to answer about the problem and the potential solutions for which the research is expected to provide (Stoneburner, </p><p>2002). Each question is listed separately within the chapter along with a detailed description that provides the reader with a concrete understanding of the significance of each question, the answer, and the evidence confirming or refuting the research done (Burr, 2013). Research Proposal 7</p><p>Conclusion</p><p>Since organizations have stopped using manual writing and </p><p> started using technology to keep up with things, it required credentialed </p><p> access for all network resources to protect employees, clients, and the </p><p> organization’s privacy. With this type of upgrade, many issues came </p><p> about with the use of different usernames and passwords for each </p><p> network. Therefore, this conclusion will summarize the findings, the </p><p> evidence, and recommendations as to how to minimize large usernames </p><p> and passwords within a large enterprise/or organizational setting </p><p>(Ormancy, 2008). Research Proposal 8</p><p>References</p><p>Andersson, D., (2013). Authentication with passwords and passphrases- Implications on usability and security. Lunds University, Department of Informatics, p. 4-11.</p><p>Bhattacharya, A., Chhaware, S.P., & Pandy, S.B. (2013). A survey on distributed network services using sso for secure mechanism. International Journal of Research in</p><p>Computer and Communication Technology, Vol 2, Issue 10, October, 2013.</p><p>Burr, W. (2013). Electronic authentication guideline, NIST Special</p><p>Publication 800-63-2, U.S. Department of Commerce.</p><p>Gerdes, J. (2008). Multi-dimensional credentialing using veiled certificates: Protecting the privacy in the face of regulatory reporting requirements. Computers and Security, Vol. 28, p. 248 – 259.</p><p>Hillegersberg, J., & Smits, D., (2013). The continuing mismatch between it governance, theory, and practice: Results from a delphi study with cio's.</p><p>University of Twente’.</p><p>NISO, (2011). ESPReSSO: establishing suggested practices regarding single sign-on.</p><p>NISO, Baltimore, MD.</p><p>Ormancy, E, (2008). CERN single sign-on solution. Journal of Physics.</p><p>IOP Publishing, Conference Series 119, p. 1-2.</p><p>Schmidt, (2011). Illiad, cas, shibboleth, and php: the road to single sign-on. University of South Florida Academic Services Faculty and Staff Publications, Tampa Library.</p><p>Stoneburner, (2002). Risk management guide for information technology systems. NIST Special Publication, 800-30.</p><p>Wurzler, J., (2013). Information risks and risk management. SANS Institute, p. 2-4. Research Proposal 9</p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages9 Page
-
File Size-