logo

Risk Management Assignment | Information Technology Assignment

   

Added on  2020-05-28

12 Pages2578 Words59 Views
Running head: IT RISK MANAGEMENTIT risk managementName of the StudentName of the UniversityAuthor’s Note

2IT RISK MANAGEMENT Table of ContentsIntroduction......................................................................................................................................3Biometric Systems...........................................................................................................................3Privacy Enhancing Technologies (PET)..........................................................................................6Wireless Sensor Networks (WSN)..................................................................................................7Conclusion.......................................................................................................................................9References......................................................................................................................................11

3IT RISK MANAGEMENT IntroductionInformation technology has gained prior attention from different researchers all over theworld. The use of information systems has been increased in the business organizations. Variousadvanced devices are being used in the business organization for various purposes includingsafety and security. This report deals with the use of biometric systems in access control systems. Theadvantages and disadvantages of these systems are discussed in this report. The use of thePrivacy Enhancing Technologies (PET) has been described properly. Three PETs that are usedover the internet have been explained. This report outlines the wireless sensor networks (WSNs) and its architectural stack.Different threats and risks to the WSNs have been identified and critically analyzed in the report.Some recommendations have been provided at the end of the report. Biometric SystemsBiometric technology is used to identify and recognize the physical identity of anindividual involving in physical and behavioural characteristics. However, a biometric system isable to calculate biometric information of a person by comparing the results stored in its database(Rampini, Sufi & Viswanathan, 2014). There are various applications of the biometrictechnology including palm print, face recognition and gait recognition. Palm PrintPalm print technology has been an emerging technology and accepted by biometricsystems. The processing level of a system includes image acquisition level, feature acquisition

4IT RISK MANAGEMENT level, feature extraction level, match score level and decision level. There are various advantagesof the palm print technology (Meyer & Reniers, 2016). As the palm area is larger than otherbody parts, it contains some pattern. Therefore, it provides more secured structure than thefingerprint. However, this helps in identifying systems in fingerprints. On the other hand, it hassome disadvantages including more processing time during identification of palm prints. Theextraction method used in the palm print technology is complex than other biometric systems.There are various applications of print palm technology used in different companies includingNEC and PRINTAK, for criminal applications (Brown & Moles, 2014). These companies usevarious devices that include palm print technology for monitoring criminal activities around. Face RecognitionFace Recognition technology has emerged in the recent world in order to provide securityto data and information. The sensor in the system detects the structure if the face and matcheswith data stored in its database. Face recognition technology depends on facial expression ofhumans. Face detection methodology helps in detecting facial expression and structure regardlessof their position, scale and illuminations (McNeil, Frey & Embrechts, 2015). Various techniquesare used for detecting a face of humans including knowledge-based face detection, Structuralmatching detection, Appearance-based detecting and template matching. There are variousadvantages of the face recognition technology including face detection even having two identicaltwins. However, it creates difficulties in matching face structure with original structure stored ina database. It does not work of wearing a mask on face. It creates difficulties during enrollment.This technology is used in providing access control to various devices including cameras, mobilephones and computers. Gait Recognition

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advantage of Face Recognition Technique
|8
|1277
|58

Risk Management: Biometric Methods, PETs, and WSN Threats
|12
|2839
|231

Biometric Systems, Privacy Enhancing Technologies and Wireless Sensor Networks
|11
|2471
|380

Assignment Risk Management | Bio-metric System
|11
|2398
|43

Research on Types of Biometric Systems
|12
|2874
|127

Future of Biometrics in Security
|5
|1185
|372