Best Practices in Identity Management
Information Security has different definitions in different scenarios. However, it is a very important concept. Every organization needs to have some type of identity management system in place. The system can then be expanded to other business practices. The paper seeks to identify technologies that can be helpful in maintaining identity system. It also discusses best practices for this purpose. The paper makes an assumption that about the efficiency of Public Key Infrastructure (PKI). It assumes that identities can be best managed using this technology. It also seeks to dispel certain myths about PKI. It counters the charges of PKI being too expensive or difficult and unproven. The paper then explains the concepts of PKI and PKC. Public Key Infrastructure is the foundation required to manage Public Key Cryptography (PKC). PKC has been developed to enable secure communication between nodes. The system is based on the perception of special liaison between two different numbers. One number is made public and this number is known as public whereas the other number is kept secret. As there is a need of one key for the encryption purpose and of the other key for the purpose of decryption, this system is called asymmetric encryption. This paper makes an evaluation of this system.