Sunday, May 3, 2020

Case Study for Department of Administrative- myassignmenthelp

Question: Discuss about theCase Study for Department of Administrative Services. Answer: Develop strategy for protecting informal digital identity It is identified that there are number of personal as well as data protection risk associated with the digital identity that is created by the users in the portal of MyLicense. The risks that are associated with informal digital identity are elaborated below: The safety of the users can be at risk: Due to data theft as well as hacking the informal digital identity can be at risk (Beduschi et al., 2017). It is identified that if proper security measures is not taken by the department of administration for security digital identity of the people then the safety of the people are at risk. Leakage of important as well as personal information: The personal information including, name, address, phone number can be hacked if the portal of DAS do not provide proper security (Bozkurt Tu, 2016). This will create number of challenges as well as risks for the people who uses the portal of MyLicence for renewing their license of the services. Leakage of financial information: The people generally login in the portal of MyLicense and renew their services. It is identified that the users can pay for the renewal online whose information can be stored within the portal (Reamer, 2013). If the digital identity of the persons faces risk then it would put the financial information at risk. The above risks that are faced by informal digital identity on the portal of DAS can be resolved or mitigated by adopting proper strategies as well as methods that are as follows: Digital identity must have proper security control: It is identified that by compromising the authorized users informal digital identity, the hackers can access the information ad as a result it would create number of security related issues (Balsam et al., 2015) Therefore in order to mitigate the issue it is quite important to authorize as well as authenticate the access of the user in order to secure digital identity. The Web access management must evolve in order to keep them ware about various security threats as well as vulnerabilities. Identity context must be important for insider threat as well as threat prevention: It is identified that the users of the portal of DAS are privileged with access in the remote location but it is very much important to evolve proper identity context as well as transactional attributes for making sure that legitimate users have accessed which further helps in avoiding the activities of fraudulent users (Simmonds, 2015). Identification of governance and analytics: It is identified that the department of administration must have customized IT driven identity management for governing the information as well as data of the people that are mainly stored within the portal in order to support their regulatory compliance (Al-Khouri, 2014). It is identified that proper auditing as well as risk teams must be present to focus on the threat of informal identity so that they can be able to make proper decision as well as strategies that are helpful in providing security risk management. References Al-Khouri, A. M. (2014). Digital identity: Transforming GCC economies.Innovation,16(2), 184-194. Balsam, K. F., Molina, Y., Blayney, J. A., Dillworth, T., Zimmerman, L., Kaysen, D. (2015). Racial/ethnic differences in identity and mental health outcomes among young sexual minority women.Cultural diversity and ethnic minority psychology,21(3), 380. Beduschi, A., Cinnamon, J., Langford, J., Luo, C., Owen, D. (2017). Building Digital Identities: The Challenges, Risks and Opportunities of Collecting Behavioural Attributes for new Digital Identity Systems. Bozkurt, A., Tu, C. H. (2016). Digital identity formation: socially being real and present on digital networks.Educational Media International,53(3), 153-167. Reamer, F. G. (2013). Social work in a digital age: Ethical and risk management challenges.Social work,58(2), 163-172. Simmonds, P. (2015). The digital identity issue.Network Security,2015(8), 8-13.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.