Management Information Systems: Managing The Digital Firm (16th Edition)
Management Information Systems: Managing The Digital Firm (16th Edition)
16th Edition
ISBN: 9780135191798
Author: Kenneth C. Laudon, Jane P. Laudon
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 8, Problem 1IQ

Explanation of Solution

 Identity management:

  • The Identity management (ID management) denotes an organizational process to identify, authenticate and authorize individuals to have access to an information.
  • The information includes applications, networks with user rights and other company information.
  • It includes authentication of users and determine whether they are allowed for access to a particular system.
  • It determines whether a user has access to the systems but also sets access level and permission level for users.
  • It includes control over process of authorizing system or network permissions for existing users.
  • It includes off boarding of users who are no longer authorized for access to organizational system.

Authentication:

  • Authentication denotes a process of recognizing identity of a user.
  • It denotes a method to associate an inbound request with identifying credential set.
  • The credentials delivered are compared with the values of file in a database of authorized information of user within the authentication server.
  • It has two different phases, identification as well as actual authentication.
  • The identification phase would provide a user identity to security system.
  • This identity is been provided in form of a user ID.

Explanation of Solution

Working with IT security systems:

Yes”, the user has worked with IT security systems and identity management. The job nature was to ensure proper working of the systems in an organization.

Explanation of Solution

Nature of work with the software:

  • The job nature was to ensure proper working of the systems in an organization.
  • The proper updating of virus protection software and system updates was one of the responsibilities.
  • The scheduled back up schemes is to be controlled and managed.
  • To ensure proper working of software present in organization.
  • To ensure credentials provided by user matches with that of access file database.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Knowledge Booster
Background pattern image
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education