Identity-Based Security: An Imperative for Cyber Security

##plugins.themes.academic_pro.article.main##

Uzukwu Joy Ebere
Nworuh Godwin
Asiegbu, Baldwin Chukwunanu
Ahaiwe, Josiah
Nwokorie Chioma Euphemia

Abstract

Identity-based firewall provides a means through which administrators can uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username. It utilizes the eight layer or the "human layer” in the network protocol model. This therefore provides identification of attackers or their victims with username, insight for administrators into the source of attacks, great control over who is carrying out a particular activity in the network, creation of identity-based policies and reporting measures to track identity-based usage, problems and several intrusions. The awareness of user identity and group information is very important to most theoretical and all practical models of digital identity secure access to resources and data, which may reside in various data centres. The application of users' IDallows the next-generation firewall to consistently enforce policies based on users, their location, time of access, type of device notwithstanding. This provides identity-based security, enterprise-wide visibility and deep monitoring of user activity based on specific users and groups rather than Internet Protocol addresses alone. Layer eight firewall provides a strong foundation on which an organization can adopt security and curtail the success of cyber security threats.

##plugins.themes.academic_pro.article.details##

Most read articles by the same author(s)