Investigating Information Security In The Digital World And Analysing Digital Identity

Publish Year: 1403
نوع سند: مقاله کنفرانسی
زبان: English
View: 8

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

SETIET06_052

تاریخ نمایه سازی: 2 مرداد 1403

Abstract:

A digital identity is a collection of information about a person, organization or electronic device that exists online. This includes all unique identifiers and uses patterns that enable the identification of individuals or their devices. This information is often used by website owners and advertisers to identify and track users in order to personalize and deliver targeted ads and content to them. In this paper, we examined the impact of identity and access management on information security. Identity and access management (IAM) is recognized as a critical element in the IT security system within an organization that is tasked with managing the digital identities and access of users. IAM includes policies, procedures, and technologies that minimize the risks associated with identity-based access within an enterprise. In the current IT environment, companies face multiple challenges, including management issues, data protection, regulatory issues, and regulatory compliance. To maintain competitiveness, companies must have effective internal controls. In the field of information security, identity management is considered as a potential solution to improve operational processes, reduce costs, improve reporting capabilities and ensure regulatory compliance. Also, this article deals with the impact of identity management against threats such as identity theft, which have serious effects on people's economic choices and data security. Ultimately, IAM will evolve and evolve with more professionals, identity and access management technologies, along with training and certification programs. Overall, IAM will grow in the future with the increasing importance of information security and providing appropriate access to digital resources in the digital world.

Keywords:

: digital identity management , information security , privacy protection , encryption , security threats , digital attack prevention strategies

Authors

Sajad Raisi Bidekani

Master of Information Technology Engineering, Foladshahr Industrial Non-Profit

Yaser Mohammadi

Master of Information Technology Engineering, Qom University

Sara Mousavi

Bachelor of Medical-Bioelectrical Engineering, Islamic Azad University, Kazeroon branch