Ask a question from expert

Ask now

Document on Personal Identifiable Information Strategy

4 Pages1013 Words209 Views
   

Added on  2020-05-11

Document on Personal Identifiable Information Strategy

   Added on 2020-05-11

BookmarkShareRelated Documents
Running head: PERSONAL IDENTIFIABLE INFORMATION STRATEGYPersonal Identifiable Information StrategyName of StudentName of University
Document on Personal Identifiable Information Strategy_1
1PERSONAL IDENTIFIABLE INFORMATION STRATEGYAppendix C3. Protection of Informal digital identityDigital identity is the set of attributes which involves a particular person, an organization and it associates the confidential and the privatedata like the username, password security pin and the security number and the birth. The proper strategies must be implemented to assure thesecurity of the individuals, for securing the data protection of the individuals. Digital identity is generally network identity. The digital identity isone of the vital are the security and privacy. A digital identity gets linked to the various identifiers like emails, domain name and the URL. Nowwith the advent of IT technology the cybercrimes have increased a lot. The risks have increased related to identity theft, digital security and thedigital authenticity, and validation must be done to assure the web infrastructure and the network architecture. The digital identity comprises ofvarious data attributes and the data attributes involve the social security number. Protecting the privacy and the confidentiality and the digitalidentity of the clients in the My License portal is an absolute necessity.The various strategies associated with the protection of the digital identity have been elaborated below-i. The accessibility of the data of the clients and the employees are made in such a way that only the authorized users can only gain into thesystem accounts and the database accounts. Authentication is the process by which the device’s identity and the clients’ identity can be accessedand verified. There is a security technique called the single sign-on and it contains the authentication keys those keys are valid for the single timeuse. The one-time authentic key eliminates the possibilities of the leaked keys by any means and also eliminates the access of the unauthorized
Document on Personal Identifiable Information Strategy_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CIA Triad, Authorization, Authentication, Ethics, and Security SDLC in Information Technology Management
|6
|1938
|340

Implementation of CIA
|4
|768
|382

Casestudy Of Governance In The Financial Sector
|21
|5669
|21

Cloud Privacy and Security: Threat and Risk Assessment, PII Privacy Strategies, Digital Identity and Controls, Governance Plan
|35
|1107
|202

Public-Key Infrastructure (PKI) - Importance, Working, and Benefits
|10
|2275
|404

Information Security Systems in ATM
|9
|1901
|332