Free Essay

Sso Trends

In:

Submitted By sduart
Words 2293
Pages 10
SSO Trends and Security Concerns

The constantly changing landscape of contemporary technology, presents many challenges. Of these challenges, maintaining the security and confidentiality many have come to expect has been the most important. The convenience and simplicity of single sign-on may offer many conveniences but it also presents many challenges. The former trend of users needing to have multiple usernames and passwords is obsolete with the implementation of technology from Microsoft .NET Passport and similarly the Liberty system for corporations. The security risks significantly vary with each trend. Although, the latest trend in single sign-on for the Internet may boast ease of use, it presents several significant security concerns for the protection of personal data.

Internet users commonly browse multiple sites that may request personal information including but not limited to name, email address, username and password. Remembering and entering various credentials for every website visited can be very inconvenient for the user. A single sign-on system allowing a user to browse various websites using only one login is a convenient option compared to the alternatives that requires remembering multiple usernames and passwords. Single sign-on technology utilizes a single login at one particular site, to grant access to other sites. The single sign-on software collects all the users sign in credentials, which authenticates the users information at each respective website. The user is required only to sign-in at one website, while the other affiliated websites the user may browse will automatically authenticate using personal information from the original login. This technology has been implemented in both the personal sector and in business, specifically, for use in commerce.

Microsoft Windows 8 currently allows users with a Windows Live ID to automatically log into a Windows 8 laptop, desktop, tablet, or any other embedded device connected to the Internet and running Windows 8. When a user logs into the Windows 8 device with their own Windows Live ID, the operating system will access the Cloud Sky Drive data and import/migrate all personal settings and preferences to the local device. Additionally, this link will validate and access all other accounts associated with the Windows Live ID, including Facebook, YouTube, Flickr and Twitter. Therefore, if a user is logged on to Twitter on their laptop and then switched to their tablet, they would also be logged on to Twitter.

Windows 8 and Windows Live ID will save the status of a currently running application. Therefore, when the user searches for a movie on Fandango, this application will store the session in the Microsoft Cloud. When the user logs into another Windows 8 device connected to the Internet, the device will have the Fandango Application appear within the same session opened on the other device. This feature also works with music, movies and most games. Also, integrated into the Microsoft single sign-on is the ability to be logged into a website even if the computer does not have a cookie for the browser, the SDK will immediately detect that condition and log the user into a website such as ESPN insider or blogger.

The account login service that authenticates the credentials from Windows 8 and Microsoft Windows Live ID contains flaws, which might allow malicious users to acquire unauthorized access to confidential information. Single sign-on services that are supported by ID providers including Microsoft are historically not properly integrated into non-Microsoft websites that use the service. This results in the vulnerability of personal data on the integrated websites such as those operated by Farmville, Freelancer, Target, and ESPN. These integrated websites are vulnerable to snoops, hackers and identity theft. "These flaws are also found to be diverse, distributed across the code of [third-party Websites] and [SSO providers], and at the stages of login and account linking" (Wang, 2012). Even though, Microsoft may have integrated a strong authentication process into its single sign-on system, the many third party websites may not have the stringent security measures needed to protect personal data and preserve the level of authentication offered to the user by Microsoft.

Another problematic instance of single sign-on is often referenced as, “key to the kingdom” (Clercq, 2002) configuration and type of credentials. This metaphor means that once you have access to the single sign-on password, the hacker would have access to all that the user used the single sign-on for. In the .NET Passport single sign-on, the credential required a password combined with the users email address. According to Jan De Clercq, “using bio-metric (such as a fingerprint) or possession-based (such as a smart card) will reduce the risk. However, in real life, there may only be a few people who want to use a smart card or scan their hands to read their Hotmail” (Clercq, 2002). While using this system, Microsoft’s Passport requires an algorithm that checks for weak passwords while the user registers. These features are available on .NET Passport but the password check is incredibly anemic. The .NET Passport only checks the length (more than 6 characters) and if the password contains anything from the email address. User passwords that are repetitive numbers are not checked for.

Another problem with single sign-on is called “Bogus Merchant” (Kormann & Rubin, 2000). When users login to .NET their credentials are passed through passport’s authentication. Currently Microsoft does not offer users the ability to confirm that their credentials were successfully transferred to passport’s authentication process. If the deleterious person forged a Microsoft Passport login webpage, when the user enters their credentials, the users information is acquired by the malicious website. Currently, Microsoft .NET Passport does not remind users to verify correct URL’s before login, though, due to the contemporary genre of malicious sites and phishing pages, this may be an effective measure.

Many organizations are implementing single sign-on solutions to offer more convenience and security. Presently, there are two major single sign-on technologies offered for business to use, centralized and distributed data storage. While there are benefits and security risks associated with using both technologies, each instance of single sign-on is now becoming a major trend in the business world.

A centralized database utilizes a central server which offsite users may access remotely though authentication software. There are numerous advantages to storing information in a centralized location, for example the user only has to depend on one vendor. Microsoft’s .NET passport is a centralized data storage technology. In 1999 Microsoft implemented .NET passport for single sign-on, “it is a single sign on technology that is hosted, owned and managed by Microsoft” (Costa, 2012). Microsoft’s .NET system only utilizes a centralized server that maintains records of all the users information. When the user first starts using Passport, they input all the sensitive data for Passport to manage. When the IT manager logs in to Passport and goes to purchase multiple computers from an internet vendor, the vendor receives a request from .NET and not from the IT manager directly. This system only allows the merchant to receive an ID to the IT manager and the vendor will not be able to log sensitive information. The vendor’s interface looks as if the Passport is making the purchase and not the IT Manager from your company. Passport design is very propitious because it does not relinquish any personal information.

In the decentralized data storage single sign-on system, only the absolutely obligatory is kept at that location or on the users device. In the decentralized single sign-on, the website only stores the users data which is required for that service that it provides. A webpage like fandango would only keep the user’s current location and would keep invisible the users private information. For instance Liberty is a decentralized structure for single sign-on. One of the current trends, Liberty has a decentralized system therefore all the data is not kept on a single device. The Liberty system has an architecture which allows users to link networks. The single sign-on service implemented by Liberty is a “permissions-based attribute sharing to enable organizations to provide users with the choice and control over the use and disclosure of their personal information” (Varney, 2003). Liberty was designed was to have a “commonly accepted platform for building and managing identity-based web service based on open industry standards” (Varney, 2003). When the office secretary books a hotel for the CEO, they login to site X. Website X is a services provider and then authenticates the secretary by communicating with the ID Provider. When the secretary is authorized, the secretary can confirm the reservation and payment details. Then if the secretary needs to rent a car for the CEO, they can go to website Y, as long as it is a website that is enabled by Liberty; the site will contact the ID provider which will authenticate the secretary. This login only happens once because of the single sign-on technology. Website X and website Y interact with one another with different handles so there is no collusion. The two sites share information about the users location or destination, date and time of travel. Liberty’s model of sharing data is convenient and secure because the two websites only receive the required information to accommodate their service. Website Y would not know any personal data from the original website unless the user gives authorization. This ensures only the essential information is obtained by each site. This process improves productivity because the user will be required to enter login information only once.

The previous examples of two different single sign-on systems have distinct differences but both overlap with similar security concerns. Due to the nature in the difference of users, business versus personal, many other security issues arise outside of the overlapping ones. Most user control rights are sacrificed for convenience of service, which could potentially lead to the misuse of data in malicious manner. A main concern of Microsoft .NET Passports is mishandling of the users personal data. Though Microsoft has a privacy policy, they do not have a department monitoring the use of critical data. On the other hand, a concern with Liberty is the server’s validation of credentials. When the server’s credential expires, the server must communicate this to the user registry to authenticate. IBM states, “ extending the time that the LTPA token remains cached presents a slightly increased security risk to be considered when defining your security policies” (IBM, 2010). With Liberty, the person that sets up the software is responsible for how secure the system is; however much customization is present which may allow for many errors in the implementation process.

Every sign-on system has flaws and there are some concerns with single sign-on in general. The use of unchecked and recycled passwords are parallel with single sign-on systems which has the ability to jeopardize multiple accounts with penetrating a single user’s password. The user could choose to use different unassociated logins for every website, this would eliminate the vulnerability of a single login. If the user chooses single login, the risk is the same for each website. The vulnerability can be alleviated if the user implements strength checking for passwords. Using a finger swipe to login into your entire system may also mitigate this risk.

When a user uses Microsoft .NET Passport for personal use or if a company has their employees use the Liberty single sign-on, there are significant risks to both. The user in both systems only has to remember one password, which gives the villainous threat, one password to hack. If a hacker did compromise the system, they could potentially have access to all of the users personal data and if the Liberty single sign-on is compromised, the threat could have access to all users’ information. A benefit of single sign-on is that the user only has one password, but if that password is weak or repetitive, it makes the entire single sign-on system vulnerable. Even though the single sign-on may reduce the amount of password resets MIS departments receive but also presents more difficult concerns when verifying a single sign-on system is secure. In the Liberty system, if the MIS department does not correctly setup the single sign-on system, the entire system could be quickly compromised. The user also has to put faith in the websites that are allow the use Microsoft .NET passports single sign-on that their system is secured and will not be compromised. While not every system has a blue print to be hacked, because of the web traffic that single sign-on achieves, it is often easy to identify weaknesses in the systems. Though there may be benefits to single sign-on for personal use or implementing it for your company, there are varying security risks that must be considered.

Reference

Clercq, J. (2002). SSO Architectures. In Security, International Conference, InfraSec 2002 (pp. 40-58). Retrieved from http://www.springerlink.com/content/806c0atpq9ab0nx4/.

Costa, D. (2002, October 15). Passport vs. liberty. Retrieved from http://www.pcmag.com/article2/0,2817,1172120,00.asp.
IBM. (2010, September 10). Rational app developer. Retrieved from http://publib.boulder.ibm.com/infocenter/radhelp/v8r5/index.jsp?topic=/com.ibm.websphere.wlp.nd.multiplatform.doc/topics/cwlp_authentication.html.

Kormann, D., & Rubin, A. (2000). Risks of the Passport SSO Protocol. Computer Networks, Elsevier Science Press, 33, 54. Retrieved from http://avirubin.com/passport.html.

Varney, C. (2003, November 15). Security liability . Retrieved from http://www.projectliberty.org/specs/final_privacy_security_best_practices.pdf

Wang, R. (2012, May). In Rui Wang (Chair). Commercially deployed single-sign-on web services. , San Francisco. Retrieved from http://www.computer.org/cms/Computer.org/CPS/Security Symposium/2012/2012_IEEE_SP_Wang.mov
-----------------------
10

10

Similar Documents

Free Essay

How to Use

...about different companies and must be done once you get the shortlists from these companies. 6. REMs – This folder contains all the documents used in the Niche placement preparation REMs. 7. Questions asked in summers – This folder contains questions that were asked by different companies in the previous years. We are updating the folder with feedback from as many Tuchhas as possible but it will not contain the entire spectrum of questions and should be used only to identify a trend. 8. Interesting links – This folder contains interesting links that we think are useful for you. We would keep updating the same during the course of your preparation. 9. Newsletters – This folder contains the Niche newsletters and articles that had been mailed to you previously. The division is not strict and simply aims to provide every one of you with a roadmap for preparation. This preparation is in addition to HR preparation that you all are expected to do. In addition, you are expected to know about the latest trends in marketing. In case of any doubt/suggestion or clarification, feel free to reach out to any Niche...

Words: 325 - Pages: 2

Premium Essay

Trend Article Analysis

...Trend Article Analysis University of Phoenix – MGT373 Jennifer Choy August 21, 2011 In this day and age there are millions of trends that are present in almost every industry. In order for an organization to be successful it is essential that they follow some of these trends so that their company appeals to people. This proves to be true for the event planning and convention industries. Two articles that pinpoint a couple different trends are “Nifty gadgets taking special events to a new level” and “ The article “Nifty gadgets taking special events to a new level” is a great example of trends within the planning and convention industries. In the years 2001-2004 these industries saw a huge decline in business. The reason for this was the failing economy. Companies and organizations could no longer fit events and gatherings into the budget. In 2005 event planning companies such as Dolce parties finally started to see an incline in corporate parties and events. However, these parties and events were at a much smaller scale. It was only the important people that were being invited to these gatherings because the budgets were still not back to where they were. Since the comeback of events was at a slow pace, event planners and convention industries decided to introduce some new gadgets to attract clientele. According to Stableford ( 2005)“Beyond the typical post-event surveys and evaluation of how many sales leads actually translate into qualified...

Words: 909 - Pages: 4

Premium Essay

Future Trends

...Future Trends Charmaine Saint Surin OI/466 June 6, 2016 Fred Greifenstein Future Trends According to Webster.com dictionary, a trend is usually known as something undergoing change or is developing into something or going into a general or specific direction. Innovation is about timing, but there is not a theory behind it. It includes processes and new ideas and then they are converted into new useful products. It creates value for customers who pay for it. Disruptive Innovation is an all-out risk taker, creating new markets with more practical approaches towards buyer's purchasing power. What we know is that innovation does not have an end, it's the fact that what we want and what we need continues to change. Innovation is not the goal but everything we do to get to that point. I think collaboration within innovation is an revolving trend. This is the concept of an open source. With the internet age, there are so many people connected worldwide, so there is the fact of collaboration. It creates alternatives for companies who which are smaller to have the ability to remain small and agile. If that is the choice, it also allows those less ended businesses to be a part of the larger agenda in innovation. Innovation is a connected function of communities. It seems like we are all trying to come up with new solutions that capture the technologies we encompass and maybe even working with alternatives reworking those technologies. An example of this is universities...

Words: 895 - Pages: 4

Free Essay

Citysumers

...Statistics show that only 47% of consumers around the world say they trust paid media. (trendspotting.com) * Servile brands and citysumers are a more established trend as they are wanting something new, this type of consumer lives in a capital/or town where they are usually the first to try out new products and follow the latest trends. * Servile brands let the consumer try it out first, using ‘hands on’ e-tools which allows them to test run products, for example marks and Spencer’s where they allow consumers to try before they buy on the latest nail varnishes. * IKEA has an online application where the consumer can design their own kitchen. (www.ikea.com) * Citysumers capture the essence of the city and its heritage * Established market of consumers as they are within a city latest technology and trends are available there first, outsiders from cities will be delayed. Sub trend: Modern make it and mend * Citizen hacking -using faulty or discarded objects and turning them into functional pieces- economical- cities in debt. Urbanization: * “67% of urban consumers identify themselves with their city, almost as many as the 69% that identify themselves with their nation” (www.trendspotting.com) * Culture is reflected in style of the nation * App culture Future trends: * 2013- * ‘I made that’ :Product customization and combined high tech manufacturing New, networked models of product identification. * ‘Equalized’ - Consumers...

Words: 348 - Pages: 2

Free Essay

Comparative Shop Report of Diesel

...when this promotion is going to end either. This information is supported by my findings too. The majority of the men I interviewed did say that they could no longer afford to spend large amounts of money on individual garments. Instead they stressed that before £100+ jeans would not have bothered them, however now they would be looking to spend below this figure. [pic] I felt that it was extremely important that I explored any weaknesses the consumers felt were an issue too. The main problem was that men would like to have some coloured denim within the range rather than just the same denim washes they always have. It was obvious that many consumers felt that there was not a wide enough range in terms of styles that reflects current trends; instead the styles are just subtle changes across their product range. When analysing the primary research,...

Words: 591 - Pages: 3

Premium Essay

Fashion During The 60's

...a noun, “Fashion is a popular trend or the manner of doing something”. As a verb, it says “make into a particular or required form”. To me, fashion is a never ending cycle of various styles that people can express themselves through. It is a movement that allows individuals to show who they really are through clothes. Throughout the past 65 years, fashion evolved so much in so many different ways. I decided to take a look at those ways and to see how fashion has come about to what it is now and how some trends still remain the same until this day as a classic. The 60’s was the year that the television had a huge impact on what people were exposed to, such as fashion trends. It helped the youth stay in touch with what was...

Words: 1370 - Pages: 6

Free Essay

Tamen Craze in an Instant

...restaurants have been opening one after another due to its popularity and success which entrepreneurs saw as an opportunity to open other famous ramen restaurants as it has become a trend. In SM Megamall as I walk inside the new Mega Fashion Hall crowded with people in the late night, I take the elevator to go up on the 3rd floor of the building where the well-known recently opened ramen restaurant called Ippudo Ramen is. The first sight that will appear before your eyes after the elevator doors open will be a crowd of people lining up for Ippudo. The wait is definitely worth it as the food there is extravagant and definitely food that you will come back with. In an interview from Shigemi Kawahara, he said that the reason people line up in Ipuddo might be “Because it’s delicious. We train our staff that every single bowl of ramen has to have a smile and maybe our customers can feel that. It’s very easy to serve a good bowl of ramen. Delicious ramen is everywhere, but what’s important to us is the quality, the service and the cleanliness” (Japan’s World-Famous Ramen House Opens in Manila). I have eaten their food and I would like to say that the food is divine with rich flavors that Filipinos will love and so far has been the best ramen restaurant in the Philippines in my opinion. The food trend started pretty recently in the Philippines as Filipinos are only beginning to appreciate...

Words: 1149 - Pages: 5

Premium Essay

Family of Woodstock

...Family of Woodstock, Inc. Paper India Larondos BSHS/355 August 24, 2015 Professor: T. Jones Family of Woodstock, Inc. Paper This paper will discuss the factors that led to the creation of Family of Woodstock. It will also discuss the changes that Family of Woodstock endured to meet the specialized needs of the community. To add, the paper will include the development and changes in values, attitudes, and beliefs over a 40-year period; and how these changes affected the way they deliver services. Lastly, this paper will explain how specializations became a trend across human services delivery, in general. Introduction In 1969 America’s youth was in search of utopia and found it at a music festival called Woodstock in Ulster County. Young people travelled from all over to partake in the Woodstock festival, nearly 400,000 young people came to attend the festival (Gibbons, 2010). However, after the music festival ended, people were stuck in that county which turned into a problem. Homelessness and drugs became a major problem, the young people slept on benches, camped out in parking lots, and searched for food and clothing (Gibbons, 2010). This also became a problem for the townspeople. The young people were getting in trouble with the law because of the drugs. One woman, Gail Varsi, recognized the problem and decided to do something. She first, gave police her home number and instructed them to call her whenever a homeless youth got in trouble. She then reached out to...

Words: 811 - Pages: 4

Premium Essay

Marketing Strategies

...implement with regards to trending, they are; Scanning, Listening, and Forecasting. According to this author, the first strategy, scanning, is to identify the different media outlets, cultural developments and various brands to further investigate how other brands are performing in the market. This will provide insight as to the consumers view and trends toward current brands. The second strategy is listening, which focuses more on social media, and which communities are leading the discussions, and why. Social media gets you in touch with your customers, drives business to your websites, and opens the door to engage customer communications and so much more. If you’re not on social media, than you’re missing a huge opportunity to grow your business and get in touch with how your customers feel about various brands. The third strategy is forecasting. Forecasting is all about researching firms that trend for a living, such as Cassandra Daily and PSFK. (White., S. 2012) This can help you identify key movements in the market and possible opportunities to help you grow your business. By understanding what market trends affect your business, you could identify changes that could positively or negatively affect your business, such as online social media factors, brand awareness, and sudden changes in the economy that may directly affect consumer opinion toward spending. I chose the lodging icon, Airbnb, with its company slogan “Belong Anywhere”. Airbnb was started...

Words: 509 - Pages: 3

Premium Essay

Eric King

...Principles of Entr3preneurship Business Trends ERIC KING AI logo © 2013 by Eric King According to Tim-Graw (2012), the social trend is evident throughout the world with more networking events and opportunities occurring weekly. Social trend involves top social networking platforms such as Facebook, MySpace, and other Internet networking sites. The list continues further with the creation of music apps, Spotify, Pandora, and these other networking sites will impact the industry by providing opportunity for growth. Whenever a new social media tool is created, a new opportunity is as well. New opportunity means an increase in jobs, expanding the pool of success to Full Sail graduates and other industry driven people. This trend will also be impactful to the industry by recognizing what’s new and hot on the market! New applications are being formed from web 2.0 tools allowing for users to run businesses with just one click away. It is important that we monitor this trend to see what exactly are the people are following. You have to know your target audiences wants and needs in order to satisfy them and become successful. One example of a business monetizing from social trend is Rick Ross’s, Untouchable MayBach Music Group also known as MMG. “Maybach Music Group has climbed to the forefront of mainstream rap” (BET, 2013). In order to be great in this music industry, you have to be able to keep up with the trends of it. Though Rick Ross has a catalogue of 4 popular mainstream...

Words: 696 - Pages: 3

Premium Essay

M2 Assignment 2012

...Berndt, A. & du Plessis, J.P., 2012. Applied Strategic Marketing. 4th ed. Heinemann. or the old edition Du Plessis, J.P., Jooste, C.J. & Strydom, W.J., 2009. Applied Strategic Marketing. 3rd ed. Heinemann. QUESTION 1 This question reflects on the analyses of the macro environment. (Jooste et al., 2012, Chapter 2; or Du Plessis et al., 2009, Chapter 2). The students have to identify FIVE trends in the macro environment that impact on micro breweries. A trend is something that changes in the macro environment, for example:  Rise in disposable income  Customers search for value for money  Rise of black middle class  Rise of social media  Rising costs.  Environment protection/‘green industry’  Changing lifestyles  Changing role of women  New legislation  Consumer Protection Act  Changing needs of consumers. Each trend has to be discussed briefly and the student has to indicate what the impact and influence of the trend on the micro breweries industry are. Mark allocation:  Definition of trend (1 mark)  Impact of trend (2 marks)  Implications for marketing of micro breweries (3 marks)  5 trends x 6 marks = 30 marks. Marking Memorandum: 2nd Semester 2012 © IMM Graduate School of Marketing M2/MAR202 [30] Page 2 of 2 NOTE: It is not possible to provide model answers. The students have total freedom to formulate their answers. QUESTION 2 2.1 [30] (See Jooste et al., 2012, pp.123-127; Du Plessis et al., 2009, pp.130-132.) Students can reflect on:  Direct versus indirect...

Words: 490 - Pages: 2

Free Essay

Adx Comparison

...much directional movement - or trend - is in a market. It is often combined with the Average Directional Movement Index (ADX) study. The DMI is plotted as two lines. You can determine Bullish or Bearish trend direction by two directional indicator values - +DM and -DM. The calculation determines the relationship of the current close to the previous close. If the current close is higher, a greater value is placed on the +DM and a lower value on the -DM. This means in a strong trend, the lines will move in opposite directions, and in a correction or sideways move they will converge. There is also a calculation connected to a range, Average True Range, or DMIATR, so if a range begins to contract in a trend, the lines may also begin to converge as momentum slows. The formulas for determining DMI and ADX are not complex. You must first determine the Directional Movement - DM - for the current trading interval. After several more mathematical steps, a DM value between zero and 100 is determined. DMI can be used as both an entry and as an exit tool. As an exit tool, the chart shows the DMI and the DMI Difference, or DDIF. Although the DMI study does have a limit of scale, it is very rare for it to get near to those limits especially on the upside. Therefore, the DMI Diff can be used to gauge levels of Overbought and Oversold. When the difference is greater than 30, except in very strong trends, it indicates the potential of a correction or change in trend. Markets normally fall more...

Words: 1346 - Pages: 6

Free Essay

Not Yet

...Customer satisfaction level for online shopping using ACSI’s with respect to Indian shopping trends ABSTRACT Today is the Era of Globalization and the consumer is not bound within boundaries of a particular place to access products available in the outer world, now he can go beyond the boundaries of any market area where he lives, to access the things of his interest. But this virtual connectivity known as “ONLINE SHOPPING OR E-TAILING” is really a challenge for Indian customers to be associated with; they face some real time problems related to trust and quality. But the Indian shopping trend shows some rigid type of behavior towards online shopping. They do not trust this shopping style as they have to see and choose a product virtually and pay for it, without any kind of physical touch, which was really difficult to be done in Indian market, but in past 2-3 years the trends have changed at least in metros and big cities. This paper is aim to measure the customer satisfaction level using ACSI (American Customer’s Satisfaction Index), which will give us a deep insight of the market potential available in Indore for online shopping. It has been observed that Indore is adapting the changes in shopping trends in metros very quickly, they love to shop from home and enjoy online shopping. So the process of analysis of factor affecting customer satisfaction levels was initiated, ACSI Model uses the three manifest variables: Customer’s Expectation, Perceived Values and Over-all...

Words: 305 - Pages: 2

Premium Essay

Marketing Swot

...other companies. These may include the innovative products or services you provide, your management team and the company's reputation. These are the items your company must continue focusing on in order to continue its success. 2 Assess the company's weaknesses. This section of a SWOT analysis is often the most difficult step, but is also one of the most important. These items are things that are holding your company back from success. Include any problems you foresee such as employee turnover, outdated computer systems or failure to keep up with current market trends in the products you manufacture. By acknowledging the company's weaknesses, potential threats are easier to avoid in the future. 3 Investigate possible opportunities. Look within the company, the industry and the marketplace for potential options that could help your company advance. If there is a new trend in a specific product, find out if your company could benefit from manufacturing it. 4 Determine the threats to your company. This external factor of a SWOT analysis focuses on economic issues. If the economy is on a downturn, your company might be affected. Other possible threats include shifts in consumer tastes and new competitors. By learning what these are, your company may be able to take precautions to avoid the potential negative effects these threats cause. 5 Write it all down. When writing a SWOT paper, begin with the basic company information...

Words: 273 - Pages: 2

Premium Essay

Business

...Enterprise and Entrepreneurship|Unit 3: The Business EnvironmentFirst of two assignments for this unit| || Assignment title|| In this assessment you will have opportunities to provide evidence against the following criteria. Indicate the page numbers where the evidence can be found.| Criteria reference|To achieve the criteria the evidence must show that the student is able to:||Task no.||Page numbers| P1|Identify sources of information about the current business environment||1||| P2|Describe how a new micro start-up business relates to the business environment||1||| P3|Describe current trends and how these will impact on a micro start-up business||2||| P4|Describe potential ethical concerns of customers about a micro start-up business||3||| M1|Explain how the changes in the current business environment are likely to impact upon a selected micro start-up business||1||| M2|Explain how current trends are likely to impact on a micro start-up business||2||| D1|Assess the risks and opportunities changes in the current business environment pose for a selected micro start-up business||||| Learner declaration| I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.Learner signature: Date: | Assignment brief| Unit number and title|Unit 3: The Business Environment | Qualification|Level 2 BTEC Diploma/Certificate in Understanding Enterprise and Entrepreneurship| Start date|| Deadline || Assessor|| | Assignment title|Watching the Environment|...

Words: 917 - Pages: 4