Detailed Report on Cyber Security: Biometrics, Logs, and Practices
VerifiedAdded on 2019/09/22
|5
|917
|216
Report
AI Summary
This report provides a detailed analysis of cyber security practices, focusing on biometric authentication, access controls, and logging. The author reflects on the use of fingerprint scanning as a security measure, discussing its advantages such as ease of use compared to passwords, but also its vulnerabilities like potential hacking and spoofing. The report explores alternative security protocols, including access controls, detailed log creation, and the use of firewalls. The author concludes that a combination of biometric locks and log tracking creates a robust double security system, allowing for detection of unauthorized access attempts and prompt responses. The report references sources discussing biometric authentication and cyber security best practices.
1 out of 5