logo

Mitigating Concerns with Biometrics for Identification

   

Added on  2023-01-06

3 Pages711 Words83 Views
People tend to resist biometrics as a method of identification because of
their concerns that their privacy will be invaded or belief that the
technology is too intrusive in their personal lives.
a. Consider some mechanisms that could mitigate these problems
and concerns.
b. Which method(s) of biometrics that would not meet with undue
resistance from potential users would you recommend to a
manager to replace password-based access controls?
Biometric involves the usage of different body parts such as fingerprint or scanning or retina which
acts as the password to identify any individual. The biometric solution includes the regular updating
of the voice, fingerprint, signature, and iris or retinal scanning. The solution also includes following
characteristics:
Input Device: , Processor for Digital Signal: , Output Interface:
For a manger password-based control can be replaced by fingerprint scanning
because if the users use any smart card or any office card then it may be
brought by anyone else but fingerprints cannot be morphed deliberately or
intestinally and moreover a password based system needs password and needs
to be changed regularly but fingerprints are not like that.
2. What is meant by a separation of duties in data center operations.
a. What threats are eliminated with a proper separation of
duties?
b. What does separating duties force people who want to abuse
their privilege to do
Separation of duties is a security control which ensures that no person can
conduct fraudulent procedures within an organization. The benefits of
separation of duties are given below:
Threats that are Implementing separation of duties helps in overcoming many
threats. These are listed below:
• It prevents the occurrence of malicious actions.
• In case an error occurs, it can very easily be found.
Separation of duties forces two or more people to collude to carry out a fraud
thereby making it impossible for one person to have a control over an entire
process. This allows one person to keep a check over another person’s work.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Smartphones Security Issues and Mitigation Tools
|10
|706
|305

Information and Systems Security
|6
|1029
|28

Physical Security is the Process of Securing the Hardware
|8
|2647
|154

Network Security Assessment: Physical, Mobile, Perimeter and Host Defense
|8
|2647
|67

Computer and Network Security Content
|21
|1055
|20

Assignment on Application Security
|7
|1406
|60