Discuss different types of threats and vulnerabilities

Assignment Help Other Subject
Reference no: EM132097134

Short answer questions

Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes.

a) Research into the different types of biometric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages of the three types below. Give an example application when each type could be used:
- Fingerprint
- Hand Geometry
- Iris Recognition

b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer.

c) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN.
Rationale
This assessment task will assess the following learning outcome/s:
- be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.
- be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.
- be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Part A

Introduction about Bio-Metric Systems

Fingerprint
Introduction about Fingerprint
Techniques and technologies used for Fingerprint
Advantages of using Fingerprint
Disadvantages of using Fingerprint

Hand Geometry
Introduction about Hand Geometry
Techniques and technologies used for Hand Geometry
Advantages of using Hand Geometry
Disadvantages of using Hand Geometry

Iris Recognition

Introduction about Iris Recognition

Techniques and technologies used for Iris Recognition

Advantages of using Iris Recognition

Disadvantages of using Iris Recognition

Part B

Introduction about Privacy-Enhancing Technologies

Research and discuss three Privacy-Enhancing Technologies (PETs) which can be used on the Internet

Use examples to illustrate your answer

Part C

Introduction about Wireless Sensor Networks

Discuss three different types of threats and vulnerabilities which can be used to attack the Wireless sensor networks (WSNs)

Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN

Verified Expert

"This is technical writeup assignment. It covers discussions on biometrics, including fingerprint, hand geometry etc. It also cover three PET or Privacy Enhancing technologies. And it covers attacks to wireless sensor networks."

Reference no: EM132097134

Questions Cloud

Determining the required rate of return of fingen : Fingen's 17-year, $1000 par value bonds pay 9 percent interest annually. The market price of the bonds is $920 and the market's required yield to maturity
What is the bond yield to maturity : The market price for $850 for a 10-year bond ($1000 par value) that pays 12 percent annual interest, but makes interest payments on a semiannual basis
Value of this bond if it paid interest annually : What would be the value of this bond if it paid interest annually? What about semiannually?
What would it mean if a stock had a beta of 1 : The market risk of a stock can be defined as the tendency for a stock to be correlated with, and move along with the general stock market.
Discuss different types of threats and vulnerabilities : Discuss three different types of threats and vulnerabilities which can be used to attack the Wireless sensor networks - Give your recommendations
Calculate the amount of monthly payment : Calculate the amount of your monthly payment. Round to the nearest dollar.
Current value of a share of augat common stock : What is the current value of a share of Augat common stock if its current dividend is $1.50 and dividends are expected to grow at the annual compound growth
Determining the yield to maturity : If you purchase the bonds for $1075, what is your yield to maturity?
Decision to raise price/output combinations in short term : U.S. retail industry, Arc Elasticity is correctly used to assess the dollar magnitude of net benefits of a decision to raise price/output combinations

Reviews

inf2097134

10/17/2018 11:37:08 PM

Good work done by team, very much satisfied. I had a good understanding of the topics and got the assignment before due date. Guys be ready for the next assignment and thank you for the present work.

len2097134

8/27/2018 3:56:28 AM

The grade you receive for this assessment as a whole is determined by the cumulative marks gained for each question. The tasks in this assessment involve a sequence of several steps and therefore you will be marked on the correctness of your answer as well as the clear and neat presentation of your diagrams, where required. Cover Page Table of contents Part A Introduction: 0.5 marks (0.5 marks) Each technique and technology explanation: 0.5 marks (1.5 marks) Each technique advantages with explanation: 0.5 marks (1.5 marks) Each technique disadvantages with explanation: 0.5 marks (1.5 marks) Total: 5 marks

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd