Single sign-on uses a centralized session concept, and it is a service that authenticates one and one-on-one designated platform. Later, with this, we can use various services and products without logging in every time. However, there are sure demanding situations in implementing SSO. Business enterprise no longer is most effective and needs to integrate user network logon with a nearby application and software program (SaaS) cloud offering. Simultaneously, in an enterprise, SSO’s centralized solution does not include all the users, applications, devices, and equipment. Another undertaking from the records angle is that the user can log on outside SSO answers. Its user identification may also exist in exceptional forms. Simultaneously, the enterprise desires to cope with bequest desktop programs that do not coordinate with users’ listing logins which may be the frail hyperlink that reasons SSO to fail in the company. With the efficiently applied SSO and designing framework keeping in mind the challenges, we can enable and disable users to enter more than one system, platform, apps, and different resources. Also, it may effectively resolve and dispose of the problem of password-related downtime and reset expenses. Simultaneously, it removes the danger of threat from an insider, improves authentication processes and user experience, delivers authority to the company, and simultaneously provides them with the right of entry to firmly on top of the user’s things.
DevSecOps is an advancing area that is highly preferred in the field of Information technology. The main idea of DevSecOps revolves around how security could be integrated with DevOps. There exist certain tools and practices for implementing DevSecOps, but this area is not fully explored. The research serves to find out the best practices that could be implemented to enhance security in DevOps. The main objective is to provide best practices covering all the aspects of DevOps.The solutions provided in the research papers that were referred to, the results of these research papers, and reviews were considered for the study. From the data gathered a descriptive review of literature is formed and overviewed to develop all the possible effects and most widely used practices to implement DevSecOps the challenges that could be faced during DevSecOps implementation. This paper aims to provide a range of options that could be implemented for enhancing the security of the system.
In the present time, cybersecurity plays a crucial role in every aspect. Protecting data, hardware, software alone is not sufficient as the technology is growing exponentially and information is easily available. Regarding artificial intelligence data, Sentinel One platform, endpoint security shows that from February 20, 2020, to March 17, 2020, the trend was in an upward motion, as the attacks attempted has peaked to 145 threats per 1,000 endpoints, in comparison to 31 or 38 at the start of that period. According to the Q2 2018 Threat Study, the quarterly report by Nexus guard, the average denial-of-service (DDoS) attack grew to more than 26Gbps, up 500 percent in scale. Regardless of the complexities of the modern cyber climate, stereotypic defense solutions do not fulfill the information security requirements. Earlier detection techniques were sufficient to protect the cyber environment, but due to growing cyber threats such as Ransomware, malware, DDoS, we need strong protection techniques to restrict the threat’s entry. Given this context, this study explains the evolution of the Preventive techniques and detective techniques; both the approaches are complementary, which would be discussed in this paper by considering Automation Technology. It introduces the survey of various Automation Technologies implemented for the advancement of prevention-centric security. Based on the evaluation metrics, the selection of better technology is concluded.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.