Term Paper on "Job Portal Security"
Term Paper 11 pages (3023 words) Sources: 1+
[EXCERPT] . . . .
Job Portal SecurityThe objective of this work is to conduct a case study for the purpose of developing a job portal identification method or technique for authentication of the users. This is to be implemented by networking a job site with colleges across the world. The portal entry will begin from their student college web account and will connect securely with a job site. Such a system is described in the document entitled: "Oracle Open World" the design proposed herein is a system that would be compatible with the one instituted by Oracle for the Higher Education reported in the work of Matthew (2005) and reported in the document entitled: "Oracle Open World: An Enterprise Portal in 90 Days - Critical Factors Behind a Successful Portal Implementation in Higher Education."
INTRODUCTION
The work entitled: "Mechanics of Oracle Portal and Identity Management" (2003) written by Sanjeev Mohan states the fact portals are becoming "...one-stop shop for organizations wanting to share corporate information deep in a multitude of stovepipe applications. Portals provide a single point of access to the applications through a secure and highly customizable and personalizable user interface." (2003) Mohan additionally states that portals are a way of making the provision of "critical information and services to organization's employees, customers, partners and other stakeholders. Based on the roles o fend users, they have access to embedded applications or portlets, such as, self-service, HR apps, collaboration tools like web-based email and calendaring, financial data, etc." (2003) Mohan's work demonstrates the necessary steps in building an enterprise portal whi
download full paper ⤓
PORTAL OVERVIEW
The term, 'portal' is "often misused and many describe it an entry point into a single site. E.g a company's home page. The term is popular with sites like Yahoo, Excite, MSN, etc. Portal however is much more than a generic web site. They cater to a number of people..." (Mohan, 2003) the portal in actually may be classified as follows:
Enterprise Portal: Supports organization's customer's and employee's needs through provision of an integrated access to applications and services. The enterprise portal may be created as an internal corporate portal for corporate consumption or as an eBusiness portal for external users.
Public Internet Portals: Yahoo & other public sources
Appliance Portals: Through use of handhelds (PDAs, cellphones, etc.); and Vertical portals: Industries (insurance, law banking)
Portals are built to specifically provide services offering differentiation of features dependent upon the user and the user requirements. Therefore, the feature of the portal are varied in nature and include those as follows:
Application
These are tools that provide integration to packaged applications, such as legacy applications, ERP suites, CRM applications content and document management systems etc. Many of the applications mentioned here come with business intelligence components.
80% of the corporate data exists in files and other formats as unstructured data. This typically includes a full text indexing engine using innovative new products like Oracle's Internet File System (IFS) capable of navigating and indexing existing content. This feature also allows users to subscribe to external / syndicated content providers such a news, weather, sports and entertainment information etc.
Collaboration
One of the biggest benefits of portal is that it allows integration of collaboration tools to improve communication. These tools vary from email systems, calendar, chat, discussion boards etc. It allows end users to work together more effectively by establishing shared workspaces, shared document repositories, online meetings and real-time interaction. Notification of events and workflow are some other examples of collaboration.
Personal Organization tools
Tools used to personalize the content with end users' to-do lists, contacts / address books and other personal productivity tools.
Presentation
Most portal software segments the portal page into multiple sections or frames for each application. These applications either run within the section or may launch a new browser window when executed. Presentation tools allow end users to decide which applications they wish to see on their portal page and the layout and color schemes.
Search
Advance search capabilities that allow users to search structured as well as unstructured data. (Mohan, 2003)
From the view of the development and it support staff the portal features include the following aspects:
Identity Management and Security
User management is one of the biggest components of building a portal. The users need to be authenticated correctly and need to have their profiles available so that they can have access to the authorized set of applications and services (role management). Security issues become even more important when multiple applications are accessed from one place, the portal using the Single Sign on (SSO).
Content Management
Since portals may include structured and unstructured content from multiple internal as well as external sources being refreshed at varying intervals, content management becomes a critical component. Portals have adapters to extract data from the underlying systems. However, if there is no adapter out of the box for an application then the adapter must be written. Content management also includes taxonomy management.
Infrastructure well designed portal must be reliable, highly available and able to scale to the requirements of the ever-growing end user community. The infrastructure may include load balancing, caching, and other performance enhancements.
User Interface Services
Most portals today present their content as HTML pages. However, some of the sophisticated interfaces may require Java plug-ins, support for wireless and mobile users etc. (Mohan, 2003)
Mohan (2003) relates that organizations in today's world are working under "hetergenous systems. Each system may be working very efficiently to deliver the information needed by organizations but the systems are a world unto themselves. Most systems in the past were not built with the notion that one day they should be able to freely share information with other systems. Hence, what organizations have ended up with today are stovepipe applications." The following figure illustrates some consolidation techniques as cited in Mohan (2003)
Mohan (2003) states that the figure above demonstrates the fact that integration can take place any many levels in the organization and that each level of integration brings about a solution to a specific problem and has both negative and positive aspects as a result. Various solutions are stated by Mohan (2003) to include: (1) Integration of databases - This involves consolidating multiple smaller databases into an enterprise database. It allows organizations to retire multiple smaller ad hoc databases and maybe even legacy databases and the respective applications into a more stable and larger database but is only applicable for us in small applications; (2) Data warehouse - This has been one of the most common ways of creating a single view of disparate data. Enterprise-wide data warehousing projects are usually very large and time consuming. They involve extracting the data from multiple systems, transforming in to a data model for the data warehouse and then loading the data. The tool that is sued for this purpose is called Extraction, Transforming and Loading tool (ETL). Once the data warehouse is built, Online Analytical Processing (OLAP) reporting tools are used to derive the intelligence. Well-known ETL tool vendors are Informatica and Ascential. Major OLAP vendors are: Cognos, Business Objects, Brio, Hyperion and MicroStrategy; (3) EAI tools provide a bridge that allows data to be exchanged from one system to another in a transparent manner and made available to a client application. EAI layer is highly dependant on open standards so that the systems can communicate easily. Some of these stands are Java Message System (JMS) and Java Connector Architecture (JCA). Major EAI vendors include: IBM MQ Series, TIBCO, Vitria, Web Methods and SeeBeyond; (4) Application level integration has required the use of distributed computing technologies that integrate systems and application distributed over a network of systems using Remote Procedure Calls (RPC). Some of the common manifestations of RPC architectures are Object Management's Group's CORBA and Microsoft's COM/DCOM. While these technologies have been around for a long time they are limited because they don't use open standards. For instance, in the case of CORBA, all nodes would need to run the same Object Request Broker (ORB) product; (5) Web Services is the newest kid on the block. It is… READ MORE
Quoted Instructions for "Job Portal Security" Assignment:
ll the following are the specifications that I need from you.
I need to develope a portal and the case study will be job.
Developing or identification of a new method/techinique for authentication of the users will be primary motive.
A brief introduction about the present technologies in market, their functioning, features and how do they work; Example monster.com, dice.com, jobserve.com and reed.com
Login matrix, strict access, permission and access matrix should be explained in detailed and systematically that will help in overcoming drawbacks of present job portals.
Achievements, market share and their major Drawbacks of three major portals in the market.
How the new portal that we are going to design will be able to overcome existing portal drawbacks, explain in chapters.
What are the further enhancements and how this portal will be thebest in today's market in terms of user safety,privacy and availability .
We need about 4 case studies about the portals, their issues, how and why did they failed in market, if they have been resolved how they have done so far.
Excellent conclusion about the topic and explaining good suggestions that will help and it should be with references of reading for suggestions made.
How to Reference "Job Portal Security" Term Paper in a Bibliography
“Job Portal Security.” A1-TermPaper.com, 2007, https://www.a1-termpaper.com/topics/essay/job-portal-security-objective/573550. Accessed 6 Jul 2024.
Related Term Papers:
Security - Agip Kazakhstan North Caspian Operating Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Security - Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO)
Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO) is the single operator of the North Caspian Sea Production… read more
Term Paper 35 pages (14948 words) Sources: 1+ Topic: Business / Corporations / E-commerce
Security and Privacy on the Internet Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Making Virtual Teams Work
Introduction
Creating virtual work teams nationally or even globally versus those that
are centralized requires two fundamentally different organizational
strategies, with each requiring a fundamentally different… read more
Term Paper 6 pages (1800 words) Sources: 4 Style: APA Topic: Management / Organizations
Windows Migration From XP Capstone Project
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Windows XP to Windows 7 Migration
Submittal Cover Sheet
Four Digit Assessment/Project Code: TWA1
Mentor Name: Janet Bringhurst
For Revisions Only Indicate Previous Grader:
Submissions received with an altered, incomplete… read more
Capstone Project 18 pages (6896 words) Sources: 1+ Topic: Computers / IT / Internet
E-Recruitment Online Recruiting Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Online-Recruitment
E-recruitment or online recruitment is the term with which most of the organizations and corporate sector is becoming familiar as this sector is getting advanced and modern day by… read more
Term Paper 5 pages (1272 words) Sources: 7 Style: APA Topic: Career / Labor / Human Resources
How Should We Help Our Organizations to Use Internet-Based Conferencing Safely and Effectively? Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Secure Teleconferencing
Assessing the Security Levels and Value of Web-Based Teleconferencing
The pervasive adoption and reliance on the Internet as a viable platform for enterprise communication and collaboration has led… read more
Essay 5 pages (1639 words) Sources: 5 Topic: Computers / IT / Internet
Sat, Jul 6, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!