To secure and safeguard information, strategies for managing or monitoring acces
ID: 3746441 • Letter: T
Question
To secure and safeguard information, strategies for managing or monitoring access to information must be in place. You are already familiar with some access-restricting techniques such as passwords, encryption and so forth. You have also probably used smartcards at some point to gain access. You might also have used fingerprint authentication to access a device, identify yourself, record attendance or open a gate.
Biometric technology can recognise and grant access to people based on physiological traits such as fingerprints, faces and even DNA. Today, it can also recognise behavioural characteristics such as how you walk or speak. Clearly this has benefits for physical security, but how can biometric technology be used to fight cybercrime and cyber-related crimes?
- Analyse how you could use biometric technology to defend against cybercrime and cyber-related crimes in your own work environment, or one that you are familiar with.
- Analyse specific examples of biometric technology used in cybersecurity. Be sure to give a brief summary of how that technology works to provide context.
- Use your analysis to evaluate these security measures and explain why they are, or are not, effective.
Explanation / Answer
Analyse how you could use biometric technology to defend against cybercrime and cyber-related crimes in your own work environment, or one that you are familiar with.
1. We know that most of us are using the same passwords in the multiple websites since we might forget different passwords. If one website is hacked, then our data might be compromised or misused.
2. We used RFID based ID cards in our workplace. This RFID has unique 24 digits hexadecimal number to identify. This number can be read by any RFID reader. If the number is read then the duplicate card can be made without hassle.
In order to avoid all these issues and cybercrimes, we can go for biometrics-based authentication mechanism. Biometrics are unique physical identifiers used for individual authentication. It is unique for each. Example: Retina Scan, thumb impression etc. It is much secure than encryption mechanism, password based, RFID based mechanisms.
- Analyse specific examples of biometric technology used in cybersecurity. Be sure to give a brief summary of how that technology works to provide context.
1. Facial Recognition Systems
It uses several mathematical, numerical and statistical codes to identify the human face pattern. It uses advanced ML algorithms like Neural Networks, Decision Tree etc to learn and recognize the face of a person from the existing patterns which are given as a Training data for the ML algorithms to learn.
2. Finger Print it works based on vascular pattern of a finger.
3. Retina Scans - Scans blood vessel pattern of an individual's inner eye.
- Use your analysis to evaluate these security measures and explain why they are, or are not, effective.
Facial Recognition
It uses various ML algorithms to learn our daily changes in our face and would detect accurately. It is much effective. It helps to provide tighter security.
Retina Scans
This biometric is much useful in banks and other confidential place to enter. The retina scan is unique and cannot be duplicated by digital means.
Finger Print
In the latest technologies, it is possible to digitally store the fingerprints and misuse it. It is not recommended nowadays.
Feel free to comment if you wanted some additional information
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.