StudentShare solutions
Triangle menu

Emerging Technologies - Essay Example

Not dowloaded yet

Extract of sample
Emerging Technologies

The authentication data for any site visited thereafter is automatically generated for the duration of that session.
The e-business revolution is fundamentally changing the world around us. We communicate with colleagues and friends by e-mail, conduct our personal banking on-line, go shopping without ever leaving our homes, renew drivers' licenses and submit tax returns without ever having to stand in line. As customers, we have been given the power of self-service, to conduct our own transactions, on our own terms, and at a time that suits our schedule, unconstrained by the limitations of physical operations. Universal authentication reflect the continuing struggle to keep the digital world accessible and secure.
It must be able to positively identify and authenticate the people that are eligible for its services. It must be able to understand each person's role and status and be able to track those attributes as they change over time. Requirements in the previous two sentences imply the requirement for robust directory, authentication and authorization systems. More and more on-line self-service applications and an increasingly complex learning environment require such systems to be based on a single ID and password. This is not simply a matter of convenience. While each person's e-Business life is made substantially easier, the security of the institution and its vital information depends on the ability to responsibly manage the underlying technology in a coherent manner.
One of the biggest problems with Internet security is the fact that every Web site has its own authentication system. A typical Internet user, who has two or three Web-based e-mail addresses and frequents half a dozen online vendors to buy or sell things, must memorize several usernames and passwords. This can be difficult unless the authentication data is written down or stored as a text file, which then becomes a security issue. Universal authentication can eliminate this problem without compromising security or privacy.
Universal authentication systems, which allow users to log in once and then hop between Web sites, may just be the answer for those who are unable to remember the various user names and passwords that they have established to access different sites on the 'Net. However, remembering different passwords and user names may just be the safer bet - for now anyway. For a universal authentication system to work, much stronger authentication - and possibly the introduction of biometrics as an extra layer of authentication - would have to be considered.

As rightly quoted by David. M in ''IT Tech' Magazine,
"Such a system would have to be designed and configured to provide multiple layers of authentication between various institutions, and would definitely have to encompass very powerful encryption (AES). "Without these, universal password authentication poses some obvious security risks," 1
There is really no such thing as a 100% secure environment, just those that have yet to be compromised. Incidents of identity theft and fraud are already on the rise, and the nature of the threat has changed from being purely malicious to being revenue-driven. Primary concern is that should a user's single login or authentication be compromised, the hacker would have access to everything, from banking details, to e-mail and online retail accounts. While signing in ...Show more


Universal Authentication is the next generation of authentication, identifying yourself to electronic services. Universal authentication is a network identity-verification method that allows users to move from site to site securely without having to enter identifying information multiple times…
Author : rhiannonwiegand
Emerging Technologies Essay essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Emerging Technologies Essay"
with a personal 20% discount.
Grab the best paper

Related Essays

Emerging Technologies
It is an admitted fact that computer technology has affected many parts of our life by playing a vital role. In addition, these advancements of information technology have made it essential for business organizations to make effective use of this technology with the intention of surviving in this ever-increasing competitive world.
4 pages (1000 words) Essay
Emerging Technologies
This is true in law enforcement as well. In the past decades, computing technology became a crucial mechanism, platform and resource wherein crimes are investigated, solved, stored, analyzed, and so forth. An important computing application - the database system or content management system - demonstrates the benefits of the technology in law enforcement work.
3 pages (750 words) Essay
Emerging Technologies
The world has become reliant on the use of technology so much that it seems impossible to gain success without the use of latest tools and technologies. Technology provides a number of benefits to organizations some of which include increased business performance, increased productivity, improved quality of products and services, improved customer satisfaction, and improved market share.
9 pages (2250 words) Essay
Emerging Technologies
Introduction Peer-to-Peer technology, also known as P2P, refers to computing technology that allows computers to connect and communicate directly and individually with other computers, where it occurs with little or no human input or interference. Computer users, known as peers, share communications, processing power, and even files with one another, in which case the technology is important for as many reasons as it has challenges.
4 pages (1000 words) Essay
Emerging Technologies
Also, this significant aspect i.e. execution of advanced technologies has been able to ensure the making of greater law enforcement efforts especially in investigation and prosecution of crime in an appropriate manner. On a different note, technological advancements are also opening grounds for increased amount of criminal activities.
3 pages (750 words) Essay
Emerging Technologies
As such, there are a number of emerging technologies that are likely to occupy a pivotal role in the year 2008, when they are expected to start playing their intended roles. Each of such potential & promising technologies is discussed below. The era of globalization has resulted in the mass movement of people from all parts of the world be it for purposes of work or for tourism.
8 pages (2000 words) Essay
Emerging technologies proposal
Artificial metamaterials are metastructures made of small units of two or more distinct materials arranged in a precise pattern. This confers unique properties on the material, like reflection or selective propagation of certain wavelengths of light. An interesting consequence of this is that materials with a negative refractive index have been constructed that can focus light much more finely than conventional lenses and can also be used for energy harvesting (Ball, 2007).
4 pages (1000 words) Essay
Emerging Technologies Master Essay
It analyzes the needs that form the driving force for businesses to align with emerging technologies. It portrays managers of business enterprises as the core towards a successful alignment. It also analyzes the planning phase of alignment, and the requirements that are necessary for a successful alignment.
4 pages (1000 words) Essay
Emerging Technologies
The iPod is a mobile device that has already become extremely popular for the storage and retrieval of music files. Podcasting makes use of this ability of the iPod like devices for the storage and retrieval of
4 pages (1000 words) Essay
Managing Emerging Technologies
By the help of ERP systems organizations are now able to ‎focus more on their research and development rather than been bother by complex procedures of
3 pages (750 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation