Document on Personal Identifiable Information Strategy
4 Pages1013 Words209 Views
Added on 2020-05-11
Document on Personal Identifiable Information Strategy
Added on 2020-05-11
BookmarkShareRelated Documents
Running head: PERSONAL IDENTIFIABLE INFORMATION STRATEGYPersonal Identifiable Information StrategyName of StudentName of University
1PERSONAL IDENTIFIABLE INFORMATION STRATEGYAppendix C3. Protection of Informal digital identityDigital identity is the set of attributes which involves a particular person, an organization and it associates the confidential and the privatedata like the username, password security pin and the security number and the birth. The proper strategies must be implemented to assure thesecurity of the individuals, for securing the data protection of the individuals. Digital identity is generally network identity. The digital identity isone of the vital are the security and privacy. A digital identity gets linked to the various identifiers like emails, domain name and the URL. Nowwith the advent of IT technology the cybercrimes have increased a lot. The risks have increased related to identity theft, digital security and thedigital authenticity, and validation must be done to assure the web infrastructure and the network architecture. The digital identity comprises ofvarious data attributes and the data attributes involve the social security number. Protecting the privacy and the confidentiality and the digitalidentity of the clients in the My License portal is an absolute necessity.The various strategies associated with the protection of the digital identity have been elaborated below-i. The accessibility of the data of the clients and the employees are made in such a way that only the authorized users can only gain into thesystem accounts and the database accounts. Authentication is the process by which the device’s identity and the clients’ identity can be accessedand verified. There is a security technique called the single sign-on and it contains the authentication keys those keys are valid for the single timeuse. The one-time authentic key eliminates the possibilities of the leaked keys by any means and also eliminates the access of the unauthorized
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
CIA Triad, Authorization, Authentication, Ethics, and Security SDLC in Information Technology Managementlg...
|6
|1938
|340
Implementation of CIAlg...
|4
|768
|382
Casestudy Of Governance In The Financial Sectorlg...
|21
|5669
|21
Cloud Privacy and Security: Threat and Risk Assessment, PII Privacy Strategies, Digital Identity and Controls, Governance Planlg...
|35
|1107
|202
Public-Key Infrastructure (PKI) - Importance, Working, and Benefitslg...