logo

IT Risk Management Assessment 2 - ITC596

   

Added on  2024-07-01

14 Pages2633 Words452 Views
 | 
 | 
 | 
ITC596
IT RISK MANAGEMENT
ASSESSMENT 2
IT Risk Management Assessment 2 - ITC596_1

Contents
Part 2 Answer 2............................................................................................................................. 2
Part 2 Answer 3:............................................................................................................................ 6
Part 2 Answer 4:............................................................................................................................ 8
Reference:................................................................................................................................... 13
List of figure:
Figure 1: Iris Recognition Biometrics system.................................................................................2
Figure 2: Hand Geometry Biometrics system................................................................................3
Figure 3: Fingerprint Biometrics system........................................................................................4
Figure 4: Wireless network Sensor Node.......................................................................................8
Figure 5: Wireless sensor network Architecture............................................................................9
Figure 6: Protocol Stack of WSN.................................................................................................. 10
List of Table:
Table 1: Iris Recognition Biometrics system Advantage and disadvantage....................................3
Table 2: Hand Geometry Biometrics system Advantage and disadvantage...................................4
Table 3: Fingerprint Biometrics system Advantage and disadvantage...........................................5
1
IT Risk Management Assessment 2 - ITC596_2

Part 2 Answer 2
Biometrics word creation forms the Greek word which meaning identifies the user
characteristics, behaviour, and physical activity. This is used for the authentication process in
the organization. Identification system and authentication system are another names of the
biometric system. It is two types such as Physiological Biometrics and Behavioural Biometrics.
Iris recognition, Face recognition, Hand Geometry, voice and signature recognition, and
fingerprinting are the common example of the biometric system. There is defined various types
of Biometrics system for example
Iris Recognition: it is a Biometrics system that used to recognize the user with the help of
pattern techniques. This technique is used in the mathematical process to match the iris of one
person eyes to another person's eyes. There is represented the block diagram of the Iris
Recognition Biometrics system. it used the 750mm wavelength light to search out the image
which is placed near the infrared. This allows chunking the light reflection from the eye’s cornea
and catching the picture that highpoints the iris assembly. It contained 3 phases such as
Picture capture
Trace image and the Iris optimization
identical or Storing the biometric template (Bhalerao, 2013)
Illustration: ATM Application
2
IT Risk Management Assessment 2 - ITC596_3

Figure 1: Iris Recognition Biometrics system
Source: (Bhalerao, 2013)
Table 1: Iris Recognition Biometrics system Advantage and disadvantage
S.No
.
Advantages Disadvantages
1. Highly threatened due to internal organ Distorts inelasticity
2 encoding and Decision-making is a Traceable
process
Invisible lighting
3. externally visible Expensive technology.
Hand Geometry: It is a biometric system that is recognised by the person according to their
hand’s outline. It is depended on the hand geometric shape. It takes different types of
information such as fingers length and width, size of a palm, and interplanetary in between the
knobs. There is shown the block diagram for a matching process of Hand Geometry system that
used the scanner and CCD camera to recognise the person. This system is able to notice the
succeeding facts in the person's hands:
Wrist point of the hand
Finger-distance and tips in between the fingers of the hands
3
IT Risk Management Assessment 2 - ITC596_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management: Biometric Systems, Privacy-enhancing Technologies, and Wireless Sensor Networks
|11
|2350
|188

Biometric Systems for Access Control: Fingerprint, Hand Geometry, and Iris Recognition
|10
|2590
|244

Biometric Systems, Privacy Enhancing Technologies and Wireless Sensor Networks
|11
|2471
|380

Assessment 2: Biometric Systems, Privacy Enhancing Technologies, and Wireless Sensor Network Security
|13
|2735
|90

IT Risk Management: Biometric Security and Privacy in Wireless Sensor Networks
|15
|2412
|429

Smart Home Automation by Biometrics Assessment 2022
|14
|798
|8