Affiliation:
1. Universität der Bundeswehr München, RI CODE, 85577 Neubiberg, Germany
Abstract
Digital transformation with the adoption of cloud technologies, outsourcing, and working-from-home possibilities permits flexibility for organizations and persons. At the same time, it makes it more difficult to secure the IT infrastructure as the IT team needs to keep track of who is accessing what data from where and when on which device. With these changes, identity management as a key element of security becomes more important. Identity management relates to the technologies and policies for the identification, authentication, and authorization of users (humans and devices) in computer networks. Due to the diversity of identity management (i.e., models, protocols, and implementations), different requirements, problems, and attack vectors need to be taken into account. In order to secure identity management systems with their identities, a systematic approach is required. In this article, we propose the improved framework Taxonomy for Identity Management related to Attacks (TaxIdMA). The purpose of TaxIdMA is to classify existing attacks, attack vectors, and vulnerabilities associated with system identities, identity management systems, and end-user identities. In addition, the background of these attacks can be described in a structured and systematic way. The taxonomy is applied to the Internet of Things and self-sovereign identities. It is enhanced by a description language for threat intelligence sharing. Last but not least, TaxIdMA is evaluated and improved based on expert interviews, statistics, and discussions. This step enables broader applicability and level of detail at the same time. The combination of TaxIdMA, which allows a structured way to outline attacks and is applicable to different scenarios, and a description language for threat intelligence helps to improve the security identity management systems and processes.
Funder
Bavarian Ministry for Digital Affairs
Subject
Computer Networks and Communications,Information Systems
Reference167 articles.
1. Ponemon InstituteCybersecurity in the remote work era: a global risk report2020Traverse, MI, USAPonemon InstituteTechnical Report
2. Why Older Adults (Don’t) Use Password Managers;H. Ray
3. Why people (don’t) use password managers effectively;S. Pearman
4. Why Users (Don’t) Use Password Managers at a Large Educational Institution;P. Mayer
5. Common Password List (rockyou.txt);Kaggle,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献