I need help getting started on this. Thanks in advance!
Please discuss the following biometrics and the vulnerabilities of each: Fingerprints, Voice recognition, Iris/Retinal Scan, and Facial recognition.
No introduction or conclusion needed.© BrainMass Inc. brainmass.com October 25, 2018, 3:54 am ad1c9bdddf
Biometrics and vulnerabilities
A fingerprint is made up of a number of ridges and valleys. Every person has different pattern of ridges and valleys which constitutes a unique fingerprint for biometrics. The biometric device using fingerprint technique uses technologies such as optical, silicon, and ultrasound to capture the fingerprint. Biometric fingerprint technique requires the person to slide the finger over a reader (in case of optical reader). The reader captures certain details of the finger scanned such as distance between ridges, depth of valleys, pattern of placement of ridges, etc. The detail of the user is entered in the database system associated with the fingerprint reader and when the user tries to log in to the system by swiping his finger over the reader, overall characteristics of finger are compared to characteristics stored in the database. If these characteristics match, the user is granted access, else not.
There are many advantages of using fingerprints, these are:
- Easy to use
- Less expensive than other biometrics
- Smaller in size
- Requires low power and maintenance
- The portion of the finger from which measurements are taken is susceptible to dirt, cuts, or day-to-day wear and tear. In such case acquiring a high quality image becomes difficult
- Some people have little or no minutia points which are an important input to the reader. For example surgeons wash their hands with very strong soap ...
This solution provides a detailed discussion of biometrics.
Implementation of Information Security Regimes
How do small-to-medium organizations differ in their implementation of security regimes, compared to larger organizations for the following topics:
1) Incident response management and disaster recovery
2) Mobile device security management
3) Linking business objectives with security
4) Biometric security devices and their use
5) Ethical issues in information security management
6) Defending against Internet-based attacks
7) Industrial espionage and business intelligence gathering
8) Governance issues in information security management
9) Personnel issues in Information security
10) Cyber forensic incident response
2,654 words, 12 referencesView Full Posting Details