Title:
Student’s name:
Professor’s name:
Institution’s name:
Date:
What Azure AD authentication feature helps you reduce password spray and phishing attacks?
Azure AD authentication is a platform that verifies one’s credentials when one is signing in to a specific device on the online platform, application, etc. it’s noted that this authentication utilizes serval steps in the verification of a password and user name of an individual. The feature that reduces phishing and sprays attack in it is the azure AD multi-factor authentication feature. It works by allowing one/user to choose another form of authentication when gaining access to a specific platform through mobile phone numbers or fingerprint scanning. It works out by ending either a particular password, a hard key, or a device that is not duplicated easily and even biometrics typical such as fingerprint and face detection. This feature reduces the chances of vector attack, like when using a password that is easy to crack by for something like fingerprint/face verification is most time hard. Thus individuals should use this feature as in the current technological advancements; it’s the most securer (De Tender, 2020).
What can you configure to reduce the password reset tickets?
As a senior administrator, I would recommend using self-service password reset(SSPR) to help individuals deal with password resetting issues without needing assistance from the help desk. This allows creating customer confidence in the Ninja developer company, thus increasing customers and profits. Also, they can use the Logon Box, where the MSPs manually help in managing activities involving access age to various platforms needing authentication (Ahmed, 2018).
What report should you consult for compromised accounts?
As a senior administrator, I should always consult on compromised accounts on the security system being used in data protection. Also, the kind of attack that was done and the reasons behind it being done to set up more strong measures on data protection. Also, one can check for the unusual loins notifications to predict how the passwords for logins were cracked. The report should also include specific information on a system that has been compromised; this developing strategy for dealing with it (Blokdyk, 2018).
What do you need to configure for the accounting application?
Accounting application is used to cover the basics in accounting like payments, invoicing, and payrolls. It’s software that is used to keep and provide accurate records and sill present financial statements. As an administrator in Ninja developers, I need to configure the corporate, governmental, public, and forensic accounting applications, thus preventing any cyber-attack to the information on them. More so, the demanding and software applications need to be configured to deal with the core network systems for Ninja developers (Blokdyk, 2018).
provide a thorough response to the forum topic, as well as at least one quality response to your peers
The insecurity of online platforms, data authentication through several configuration techniques is fundamental. As an administrator in ninja developers, data authentication o various applications is critical. If I find that when password reset tickets have been minimized, then a malware attack is minimized. Also, I would respond to the SSO software, an authentication tool that gives users the option to sign in to an application on multiple bases but using the same credentials (Ramesh et al., 2020).
References
Ahmed, R. (2018). Reset password. Cloud Computing Using Oracle Application Express, 77-84. https://doi.org/10.1007/978-1-4842-4243-8_9
Blokdyk, G. (2018). Authentication authorization (3rd ed.). 5starcooks.
De Tender, P. (2020). Monitoring Azure AD Connect with AD connect health. Azure Active Directory Connect. https://doi.org/10.1007/978-1-4842-5593-3_6
Ramesh, K., Kumar, B. A., & Renjith, P. (2020). Treats based revisiting defences against password guessing attacks and phishing data over different online records. 2020 International Conference on Inventive Computation Technologies (ICICT). https://doi.org/10.1109/icict48043.2020.9112417