Cyber Security Options

Verified

Added on  2019/09/22

|5
|917
|216
Report
AI Summary
The assignment content discusses the importance of cyber security and the various methods to ensure it, including biometric locks, access controls, detailed log creation, and use of firewalls. The author highlights the advantages and disadvantages of using biometric locks and suggests that creating logs can be a strong support to safeguard against cyber threats.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
detailed report on cyber security
Student name:
27 October, 2016

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
REFLECTION OF THE PRACTICE.................................................................................................2
DIFFERENT PRACTICES AND THE BEST OPTION..................................................................2
REFERENCES....................................................................................................................................4
1 | P a g e
Document Page
REFLECTION OF THE PRACTICE
In the previous assignment, I discussed about the ‘finger print scan’ biometric technique that
I use to safeguard my device against the cyber and user threats and vulnerabilities. This
method has a lot of advantages over the other methods available for security. For example,
passwords can be easily stolen.
Or even one may forget the password or someone may replicate it. But in case of biometric,
it is easy to make the device secure, no memorization or replication because it is what you
are, not what you know. But with all these advantages, there are certain disadvantages as
well. There are certain problems associated to its use like, prone to hacking.
Yes, the biometric data stored on the devices can be hacked and the devices can be
easily unlocked. In the present we see that for every security measure a counter hack is
developed. So same is with the biometric data. The devices nowadays are factory reset
using tools. This process erases all the security data like passwords etc. from the device and
it is as good as new.
Even if we add tracking systems, they can still be stolen and reused without getting
caught. The other threat is that the lock may stop working. This will then lock the device
hence making it more inconvenient way rather than a convenient one. The next threat is
spoofing. Anyone can pick up your finger prints from objects and spoof them and unlock your
data. For example, your device will have your finger prints all over which is a great
alternative for spoofing the data.
DIFFERENT PRACTICES AND THE BEST OPTION
Apart from the biometric locks there are other options which can be used for creating
security protocols for the devices. As discussed in the proposal, these are:
1. Use of Access Controls
2 | P a g e
Document Page
Use of access control on my device apart from use of biometrics finger print scan, is another
security area. We may use passwords, retina scans, encrypted passwords etc. as we
discussed that securing personal data, social media passwords and account information,
etc. There are certain tools developed and installed on devices for this purpose. These tools
implement access control on individual applications or overall locking of the system. These
ensure that the application and the data within them is secure and not misused intentionally
or unintentionally. Although there may be a chance of spoofing or hacking in this process as
well, yet it is a good option to rely on.
2. Detailed Log creation
Another option we discussed is Logging. It can also help in guarding against the cyber threats.
This can be done by installing the tools that create logs of the activities done on the device
be it local activity or at the backend or on the internet.
So whenever you are not near the device, you can yet know what happened
on it. It can maintain the cyber security by recording the local as well as the internet
activity. It can also act as an intrusion detection system. So now wherever an illegal
access occurs, you can always trace it. This way we will be able to maintain the
security.
3. Use of firewalls
Next we discussed was the use firewalls to guard our private network against threats and
vulnerabilities. There are various types of firewalls like packet filtering and message filtering
firewalls which help in scanning and filtering the messages which in turn can guard against
social engineering or phishing. The implementation can be carried out by use of anti-virus
software as well by enabling the firewall feature.
3 | P a g e

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
From all of these options I would use the process of creation of logs because I’m already using
the method of biometric locks to protect my device. So, log tracking will create a double
security on my device. Hence I will always know what all occurred on my computer when I
used it and when I didn’t. Logging and biometrics together can form a strong support to safe
guard even against the cyber threats. For example there may occur situation, when
someone tries to force open the system by spoofing my finger print, I can always get to know
it via the logs, and hence can change the finger print, which is not possible to detect if we do
not have logs. So a security protocol in support of the other is the best option to opt and
adapt.
REFERENCES
Williams, C., 2016. Biometric Authentication: An Added Layer of Security or Security Risk?. [Online]
Available at: https://blog.digicert.com/biometric-authentication-methods/
[Accessed 27 October 2016].
Zanderigo, M., 2016. 10 Best Practices for Cyber Security in 2016. [Online]
Available at: http://www.observeit.com/blog/10-best-practices-cyber-security-2016
[Accessed 26 October 2016].
4 | P a g e
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]