I need an explanation for this Computer Science question to help me study.


lease discuss the following topics and provide substantive comments to at least two other posts.

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.

The discussion questions this week are from Chapter 5 (Jamsa, 2013).

Chapter 5 topics:

  • Define and describe SSO.
  • Define and describe IDaaS.
  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.


What are the functions of protective barriers and what are the most effective types?

Research the difference between passive and active structural barriers to determine their possible advantages and disadvantages in a medium security facility, using information found at http://fema.gov.