logo

Risk Management: Biometric Methods, PETs, and WSN Threats

   

Added on  2023-06-09

12 Pages2839 Words231 Views
Running Head: RISK MANAGEMENT 1
Risk Management
Student’s Name
Institutional Affiliation
Risk Management: Biometric Methods, PETs, and WSN Threats_1
RISK MANAGEMENT 2
Table of Contents
Introduction...............................................................................................................................................3
Biometric recognition................................................................................................................................3
Fingerprint.............................................................................................................................................3
Fingerprint technique and technology.............................................................................................3
Application.............................................................................................................................................4
Hand Geometry.....................................................................................................................................5
Technique and Technology...............................................................................................................5
Application.............................................................................................................................................5
Iris Recognition......................................................................................................................................6
Technique and Technology...............................................................................................................6
Application.............................................................................................................................................7
Privacy-enhancing technologies (PETs)...............................................................................................7
Communication Anonymizers..............................................................................................................7
Zero Knowledge.....................................................................................................................................7
Iprivacy..................................................................................................................................................8
Wireless Sensors Network Threats and Vulnerabilities.........................................................................8
Sybil Attack............................................................................................................................................8
Recommendations on Mitigation of the Sybil Attack......................................................................9
Wormhole Attack..................................................................................................................................9
Recommendations on Mitigation of the Wormhole Attacks...........................................................9
Denial of Service Attack........................................................................................................................9
Recommendations on Mitigation of the DoS.................................................................................10
Conclusion................................................................................................................................................10
References................................................................................................................................................11
Risk Management: Biometric Methods, PETs, and WSN Threats_2
RISK MANAGEMENT 3
Introduction
This study is going to look at three different biometric methods, their application as well as they
advantages and disadvantages. The second part will be touching on Privacy-enhancing
technologies (PETs) and the last part will be looking at the risks of Wireless sensor networks
(WSNs). These aspects are risk management factors when using the internet.
Biometric recognition
Biometric recognition is an authorization and authentication technology of identifying
people automatically using their distinct biological, personal, physiological and behavioral
characteristics. These characteristics include, iris, face, hand geometry, fingerprint and voice
(Bolle, Connell, Pankanti, Ratha & Senior, 2013; Jain, Nandakumar & Ross, 2016).
Fingerprint
A fingerprint is a unique pattern and feature (parallel ridges and furrows of same width)
of a finger and is used for identification and recognition. What recognizes fingerprints is not the
ridges and furrows but Minutia; features on the ridges (Abdolahi, Mohamadi & Jafari, 2013).
Fingerprint technique and technology
One of the techniques used in fingerprint biometrics includes that one of inked fingers.
This is simply pressing a finger against an inked surface then doing the same on a piece of paper
(Daluz, 2014). However in the last decade, a new technique has been developed to take
fingerprints without using ink (Bolle, et al., 2013). The ink-less method senses ridges on a finger
that is on the surface of the livescan fingerprint scanner. Then the livescan scanner has different
technologies of acquiring the livescan image like the frustrated total internal reflection and other
optical methods. Representation of the fingerprints may be at the client end of the application or
Risk Management: Biometric Methods, PETs, and WSN Threats_3
RISK MANAGEMENT 4
the underdone image conveyed to a server for processing. The image is either compressed or
decompressed. The Wavelet Scalar Quantization (WSQ) is the recommended compression
technique by the FBI. Fingerprint matching techniques include image techniques especially when
the finger is small, feature techniques which extracts landmarks and develops different machine
representations of a fingerprint from these features, and the hybrid techniques that combine the
image’s and feature’s techniques or makes use of neural networks to increase accuracy (Bolle, et
al., 2013).
Advantages
First, fingerprint acquisition is easy; in form of impressions of inked fingers on paper and
straight impressions in things such as clay (Bolle, et al., 2013). The technology also is a cheap
and easy to use security system since a few security people are needed for identification. It is
possible to use fingerprints for continuous identification since because of its long history of use.
Fingerprints give a substantial body of real world data unlike voice and iris scanning
(Technology assessment using biometrics for border security, 2018).
Disadvantages
The first and very obvious disadvantage is the fact that a person may change physically
but the scanners don’t consider that. The installation of computer hardware and software
programs is expensive. There are incidents of false rejections or acceptance hence inaccuracy in
identification (Bolle, et al., 2013).
Application
The technology is applicable in business organizations in the developments of open
network and flexible migration of employees as a measure to protect against information
leakage.
Risk Management: Biometric Methods, PETs, and WSN Threats_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management
|10
|2170
|121

Biometric Systems, Privacy Enhancing Technologies and Wireless Sensor Networks
|11
|2471
|380

(Solved) Biometric Technology: PDF
|4
|767
|21

IT Risk Management: Types of Biometric Systems, PETs and WSN Threats
|13
|2579
|143

Research on Types of Biometric Systems
|12
|2874
|127

Advantage of Face Recognition Technique
|8
|1277
|58