Detailed Report on Cyber Security: Biometrics, Logs, and Practices

Verified

Added on  2019/09/22

|5
|917
|216
Report
AI Summary
This report provides a detailed analysis of cyber security practices, focusing on biometric authentication, access controls, and logging. The author reflects on the use of fingerprint scanning as a security measure, discussing its advantages such as ease of use compared to passwords, but also its vulnerabilities like potential hacking and spoofing. The report explores alternative security protocols, including access controls, detailed log creation, and the use of firewalls. The author concludes that a combination of biometric locks and log tracking creates a robust double security system, allowing for detection of unauthorized access attempts and prompt responses. The report references sources discussing biometric authentication and cyber security best practices.
Document Page
detailed report on cyber security
Student name:
27 October, 2016
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
REFLECTION OF THE PRACTICE.................................................................................................2
DIFFERENT PRACTICES AND THE BEST OPTION..................................................................2
REFERENCES....................................................................................................................................4
1 | P a g e
Document Page
REFLECTION OF THE PRACTICE
In the previous assignment, I discussed about the ‘finger print scan’ biometric technique that
I use to safeguard my device against the cyber and user threats and vulnerabilities. This
method has a lot of advantages over the other methods available for security. For example,
passwords can be easily stolen.
Or even one may forget the password or someone may replicate it. But in case of biometric,
it is easy to make the device secure, no memorization or replication because it is what you
are, not what you know. But with all these advantages, there are certain disadvantages as
well. There are certain problems associated to its use like, prone to hacking.
Yes, the biometric data stored on the devices can be hacked and the devices can be
easily unlocked. In the present we see that for every security measure a counter hack is
developed. So same is with the biometric data. The devices nowadays are factory reset
using tools. This process erases all the security data like passwords etc. from the device and
it is as good as new.
Even if we add tracking systems, they can still be stolen and reused without getting
caught. The other threat is that the lock may stop working. This will then lock the device
hence making it more inconvenient way rather than a convenient one. The next threat is
spoofing. Anyone can pick up your finger prints from objects and spoof them and unlock your
data. For example, your device will have your finger prints all over which is a great
alternative for spoofing the data.
DIFFERENT PRACTICES AND THE BEST OPTION
Apart from the biometric locks there are other options which can be used for creating
security protocols for the devices. As discussed in the proposal, these are:
1. Use of Access Controls
2 | P a g e
Document Page
Use of access control on my device apart from use of biometrics finger print scan, is another
security area. We may use passwords, retina scans, encrypted passwords etc. as we
discussed that securing personal data, social media passwords and account information,
etc. There are certain tools developed and installed on devices for this purpose. These tools
implement access control on individual applications or overall locking of the system. These
ensure that the application and the data within them is secure and not misused intentionally
or unintentionally. Although there may be a chance of spoofing or hacking in this process as
well, yet it is a good option to rely on.
2. Detailed Log creation
Another option we discussed is Logging. It can also help in guarding against the cyber threats.
This can be done by installing the tools that create logs of the activities done on the device
be it local activity or at the backend or on the internet.
So whenever you are not near the device, you can yet know what happened
on it. It can maintain the cyber security by recording the local as well as the internet
activity. It can also act as an intrusion detection system. So now wherever an illegal
access occurs, you can always trace it. This way we will be able to maintain the
security.
3. Use of firewalls
Next we discussed was the use firewalls to guard our private network against threats and
vulnerabilities. There are various types of firewalls like packet filtering and message filtering
firewalls which help in scanning and filtering the messages which in turn can guard against
social engineering or phishing. The implementation can be carried out by use of anti-virus
software as well by enabling the firewall feature.
3 | P a g e
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
From all of these options I would use the process of creation of logs because I’m already using
the method of biometric locks to protect my device. So, log tracking will create a double
security on my device. Hence I will always know what all occurred on my computer when I
used it and when I didn’t. Logging and biometrics together can form a strong support to safe
guard even against the cyber threats. For example there may occur situation, when
someone tries to force open the system by spoofing my finger print, I can always get to know
it via the logs, and hence can change the finger print, which is not possible to detect if we do
not have logs. So a security protocol in support of the other is the best option to opt and
adapt.
REFERENCES
Williams, C., 2016. Biometric Authentication: An Added Layer of Security or Security Risk?. [Online]
Available at: https://blog.digicert.com/biometric-authentication-methods/
[Accessed 27 October 2016].
Zanderigo, M., 2016. 10 Best Practices for Cyber Security in 2016. [Online]
Available at: http://www.observeit.com/blog/10-best-practices-cyber-security-2016
[Accessed 26 October 2016].
4 | P a g e
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon