Evaluate the viability of biometric authentication methods

Assignment Help Computer Network Security
Reference no: EM13876829

Please for Discussion question there should be minimum of 3 references using Harvard referencing style. Assignment 5 should also have as many references as possible. For the group project please provide instructions to hepl understand the project work. Many thanks, Regards, James

Summary of physical tamper-resistant devices:

Given that you have covered a wide variety of topics on security applications, now is a good time to stop and reflect on the material you covered this Week. For this Assignment, you will summarise what you have learned about physical tamper-resistant devices.

To prepare for this Assignment, use the UoL library to research and make a list of different types of physical tamper-resistant devices used in information security, with an emphasis on their characteristics. Consider the differences and similarities among those types and identify any emergent themes.

To complete this Assignment:

Write a concise summary of the themes emerging from your research on the characteristics of tamper-resistant devices and the similarities and differences among them. You do not need to include the full list of devices and their characteristics that you prepared. As part of your summary, evaluate the relative effectiveness of different strategies for making a device temper-resistant.

For all Assignments:

Your document should have 750-1,000 words (not including the list of works cited), but it is the quality of the answer that matters, not the number of words. Cite and reference all sources use the Harvard Liverpool Referencing System. By Day 7, upload your document using the Turnitin submission link for this Assignment.

Part 1:

Preparation: Install a firewall that you already know or use your own OS firewall tool. There are many firewalls freely available. The article ‘Personal Firewall Reviews' (Markus, 2013) provides some examples and ideas. The whole group should not use the same personal firewall. Discuss each individual member's choice of the personal firewall and provide some justification for the decision. Test the personal firewalls you each selected with an invited attack. You can then visit a Web site that will perform a controlled invited attack, for example, the Gibson Research Corporation (2014).

Create a report: Briefly summarise what personal firewalls can do and what they cannot do to protect your personal computer. Present one potential benefit that you get from installing a personal firewall; something that you cannot do without it. Report your findings from the invited attack on your firewalls. Distinguish between the function of a personal firewall and that of antivirus software, anti-spyware software and their relationship to personal firewalls.

Part 2:

Preparation: Download and install any security-related tools package. Some possible examples include (but you are not limited to):

• Microsoft Windows Sysinternals site (Microsoft, 2014)
• Fport for Windows from the McAfee site (McAfee, 2014)
• Lsof for Linux from the Free(code) site (Abell, 2013)
• Other tools from the CHIHT site (ENISA, 2014, see the proactive tools section)

Create a report: Describe your experience working with your chosen security-related tools. Analyse which aspects of the tools will be useful for security purposes for experts and for normal users. Submit your report (both Part 1 and Part 2) to the Turnitin link by the end of Week 6.

Biometric authentication methods for online transactions

The physical attributes inherent in biometric authentication methods raise interesting problems and concerns for their use in the realm of online transactions. The capability of current technology, issues of increased violence and the sort of attacks that can be launched against biometric methods all come into play.

To complete this Discussion:

Post: Evaluate the viability of biometric authentication methods for online transactions. Your evaluation should account for increased potential violence, types of potential attacks and the likely success or failure for particular biometric methods (e.g. fingerprints and handwritten signatures) under the capability of current technology.

Verified Expert

Reference no: EM13876829

Questions Cloud

Compute the labor efficiency variance for february : Compute the following for February: The total variance from standard cost for the units produced this period. The spending (budget) variance for the fixed portion of overhead costs and The labor efficiency variance.
What is the investor''s rate of return : What is the day count of a $5,000,000 commercial paper sold for $4,900,000 if the discount rate is 3.5 %?
Discuss the major networking building blocks : Discuss the major networking building blocks and their functions. Secondly, discuss software application's vulnerabilities, such as those found in web browsers.
Dimensions of human resource management practices : "Outline the four dimensions of human resource management practices, including specific examples of human resource practices within each area"
Evaluate the viability of biometric authentication methods : Describe your experience working with your chosen security-related tools. Analyse which aspects of the tools will be useful for security purposes for experts and for normal users.
What is the discount rate : What is the market value of a 30-day $10,000,000 commercial paper if the yield of 30-day Treasury bill is 2.5 %?
What is the investor''s rate of return : Using results from Exercises 9, 10, and 11, express the relationship between a bond's YTM and its rate of return when it is traded at par, premium, or discount.
Compute fixed overhead spending variance for able control : Compute the following for Able Control Company: The fixed overhead spending variance for October, The production-volume variance for October and The variable overhead spending variance for October.
What are the major sources of influence on h&m accounting : What are the major sources of influence on H&M's accounting standards and practices

Reviews

Write a Review

Computer Network Security Questions & Answers

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Develop a system security plan for an information system

Develop a sample System Security Plan for an information system. Select and incorporate appropriate management, technical, and operational security controls into a system security plan.

  Develop detailed plan to approach and secure incident scene

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

  Paper about cyber security and identify assess and propose

Please refer to the latest document about cyber security and identify assess and propose: Risk related indicators and governance solutions, vulnerability assessment for cyber security

  Describe possible liability issues

Describe regulatory requirements and describe possible liability issues that may be related to these cyberattacks. How should cyber policy controls be adjusted for each organization to reduce vulnerabilities and prevent disruption or theft due to ..

  Analyze the means in which data moves within organization

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguard

  Choose two firms which offer computer security outsourcing

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  How much information is available to potential hackers

Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Infa 640 cryptology and data protection

Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob’s public key.  Bob downloads a key from the key server which Eve claims is Alice’s public key.

  Evaluate computer forensic analysis procedures and

computer crime and forensic analysisprovide two examples to distinguish the difference between what is considered a

  How the database and web services can be protected

Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd