Difference between revisions of "Identity Protection Definitions"
Jump to navigation
Jump to search
(Created page with ";Identity Protection :Establishing, growing, preserving and maintaining the integrity, authenticity, reliability and validity of the relationship of an identity to the subject...") |
m |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
;Identity Protection | ;Identity Protection | ||
− | :Establishing, growing, preserving and maintaining the integrity, authenticity, reliability and validity of the relationship of an | + | :Establishing, growing, preserving and maintaining the integrity, authenticity, reliability and validity of the relationship of an identifier to the subject being identified including activities such as... |
*Anti-phishing - ensuring that all technical connections are identified as originating exclusively from the source of the connection | *Anti-phishing - ensuring that all technical connections are identified as originating exclusively from the source of the connection | ||
*Exclusivity - ensuring that only one entity is the subject of any given identifier. Think of a trademark that can only be used by a single entity. | *Exclusivity - ensuring that only one entity is the subject of any given identifier. Think of a trademark that can only be used by a single entity. | ||
Line 6: | Line 6: | ||
*Awareness - geographically and commercially | *Awareness - geographically and commercially | ||
*Anti-Theft - protecting against identity theft | *Anti-Theft - protecting against identity theft | ||
− | ; | + | ;Security Management |
:Operating and using account credentials for purposes related to the identification, authentication and authorisation of individuals and groups including activities such as... | :Operating and using account credentials for purposes related to the identification, authentication and authorisation of individuals and groups including activities such as... | ||
*Authenticating username and passwords | *Authenticating username and passwords |
Latest revision as of 03:09, 31 August 2022
- Identity Protection
- Establishing, growing, preserving and maintaining the integrity, authenticity, reliability and validity of the relationship of an identifier to the subject being identified including activities such as...
- Anti-phishing - ensuring that all technical connections are identified as originating exclusively from the source of the connection
- Exclusivity - ensuring that only one entity is the subject of any given identifier. Think of a trademark that can only be used by a single entity.
- Reputation - ensuring that an identity is known for its established quality without risk of damage
- Awareness - geographically and commercially
- Anti-Theft - protecting against identity theft
- Security Management
- Operating and using account credentials for purposes related to the identification, authentication and authorisation of individuals and groups including activities such as...
- Authenticating username and passwords
- Multi-Factor Authentication
- Single Sign On
- Password recovery
- User self management
- Identifying authorised services
- Messaging - Welcome and Broadcast
- Security policies (password complexity, lockouts etc)
- Protocol support (SAML2, OpenID Connect, FIDO2, InTune, Extensible SSO)
- Silent Inspection
- Privileged Identity Management
- Account Maintenance
- Provisioning, propagation and maintenance of accounts and groups out of a source of truth (generally the school management system) or multiple sources into dependent systems such as...
- Directories(AD, Azure AD, Cloudwork)
- Learning management systems (Schoolbox, Canvas, Google Classroom etc)
- Curriculum systems (Adobe, Clickview, JSTOR etc)
- Apps (Digistorm, EnrolHQ etc)
- Portals (EnrolHQ, Elcom etc)
- and many more