IT Risk Management - Assignment
Added on 2020-05-28
10 Pages1985 Words53 Views
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor Note
1 IT RISK MANAGEMENTTable of ContentsAnswer 1..............................................................................................................................21.1. Palm Print Recognition.............................................................................................21.2. Face Recognition......................................................................................................31.3. Gait Recognition.......................................................................................................4Answer 2..............................................................................................................................52.1. Interactive Anonymity..............................................................................................52.2. Email Anonymity......................................................................................................52.3. Communication Privacy...........................................................................................6Answer 3..............................................................................................................................63.1. Sybil Attack..............................................................................................................63.2. Spoofing Attack........................................................................................................73.3. Network Flooding and Dos Attack..........................................................................73.4. Threat Mitigation......................................................................................................7References............................................................................................................................8
2 IT RISK MANAGEMENTAnswer 1 Biometric system is an information technology system that restricts the access of aprotected area or device only to authorized users. These technological systems make use ofphysical and behavioral features of human. It is a security mechanism that authenticates theaccess of a user to a system. The biometric access control system mainly deals with theverification of the physical and biological characteristics of an individual in order to ensuresecure access. The physical, behavioral or biological characteristic of a person is generally prerecorded in the system, which is verified once the person tries to use a protected area or system.The biometric trait captured in the device is converted to electrical signal for verification(Banerjee & Woodard, 2012). The examples of different types of biometric access controlsystem includes, fingerprint recognition, face recognition, palm print recognition, gaitrecognition, iris recognition and so on. The advantages and disadvantages of face recognition,palm print recognition and gait recognition are as follows. 1.1. Palm Print Recognition The palm print recognition is authentication or access control system that collects thebiometric data of the entire palm for authentication. This captured biometric data of the palm iscompared with the recorded data in of the system. The advantages and disadvantages of palmprint recognition are as follows- AdvantagesThe advantages of palm print access control are as follows (Cappelli, Ferrara & Maio, 2012)-
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Assignment Risk Management | Bio-metric Systemlg...
|11
|2398
|43
Advantage of Face Recognition Techniquelg...
|8
|1277
|58
Research on Types of Biometric Systemslg...
|12
|2874
|127
Risk Management Assignment | Information Technology Assignmentlg...
|12
|2578
|59
Smart Home Automation by Biometrics Assessment 2022lg...
|14
|798
|8
Security Assignment: Fingerprinting vs Face Recognitionlg...
|27
|7463
|220