Author:
Mollakuqe Elissa,Dimitrova Vesna
Abstract
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges. Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with. Authorization, meanwhile, determines the specific actions and privileges granted to users based on their roles and permissions. Methods To understand the variances in identity management and access control approaches, we conducted a comparative analysis between public and private universities. Our investigation scrutinized the user populations with access to university systems, the enforcement of access limitations, authentication methods, and password policies. Additionally, we examined the nuances of authorization processes, levels of authorization, access approval authorities, user status and role changes, unique user account management, account deletion procedures, user authentication methods, password complexity and expiration policies, password storage methods, and session termination policies. Results This study revealed that both public and private universities prioritize these security measures, with a common categorization of these processes. Nevertheless, there exist disparities, such as the inclusion of contractors and vendors in the user population at private universities, the manual deletion of user accounts in private institutions, and variations in password policies and storage methods. Private universities tend to enforce stricter password policies, employ more secure password storage methods, and implement automatic session termination features. Conclusions This research provides valuable insights into the practices and approaches adopted by public and private universities to safeguard their digital environments. The findings serve as a valuable resource for enhancing identity management, access control, and authorization protocols, enabling institutions to fortify their cybersecurity defenses in an ever-evolving threat landscape.
Funder
European Cooperation in Science and Technology
Reference12 articles.
1. Identity management: A foundational element of cybersecurity.;R Anderson;Commun ACM.,2013
2. NIST Special Publication 800-162: Guide to Attribute-Based Access Control (ABAC) Definition and Considerations.;D Campbell,2012
3. Analysis of data security and privacy in public institutions according to gdpr in the Republic of Kosovo.;E Mollakuqe
4. A fine-grained access control system for XML documents.;E Damiani;ACM Trans Inf Syst Secur.,2002
5. Role-based access control.;D Kuhn;ACM Trans Inf Syst Secur.,2003