IT Management Report: Biometric Authentication and Security Concerns
VerifiedAdded on 2023/01/19
|5
|1162
|73
Report
AI Summary
This report delves into IT security, focusing on key aspects such as confidentiality, integrity, and availability, illustrated through examples like ATM systems. It examines the significance of these principles in maintaining secure transactions and protecting user accounts. The report then analyzes biometric authentication, discussing its advantages and disadvantages, including cost, points of failure, and accuracy concerns. It explores the reasons why individuals might not prefer biometric authentication, considering factors like cost and potential for errors. The report also presents scenarios illustrating the potential consequences of biometric authentication, such as false negatives in emergency situations and the impact on individuals' well-being. Finally, it provides references to support the analysis.

Running Head: IT MANAGEMENT 0
IT SECURITY
IT SECURITY
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IT MANAGEMENT 1
1) Below are presented various extensive range of example –
Confidentiality
With the help of ATM (Automated teller machine), the account can access use the
card and PIN (personal identification number).
This will help the user to believe that host system will keep the PIN confidential
and during the transaction including the channel of communication between the
server of bank and host system.
Degree of significance of confidentiality – It may be called a compromise to the
account when the PIN is unsecured during the transaction. Therefore, it needs to
ensure that PIN should be clearly encrypted.
Integrity
Generally, while doing transactions, a user expects that those records related to
transaction with no accidental or malicious change. Hence, the actions performed
via the ATM must be linked to the account connected with the card.
Degree of significance of integrity – Think that $400 is withdrawn by user and
now $5600 the balance left in the customer. Instead of updating $5600 in the
account of user, unintentionally if it updated as $5000, it will lead to unexpected
amount loss. Hence, the integrity of the transactions should be secured as the
transactions performed directly impact the customer account.
Availability
It is very important that ATM machine needs to be available to serve the customer
whenever there is a requirement and at any given time (Narman et al, 2014).
Degree of significance of availability – It raises the economic growth of a bank,
therefore the ATM should be serviceable and operational almost all the time i.e.
99.98%.
2) The reasons where individuals might not prefer biometric authentic may include
various objectives. Biometrics is the authentication which offers security on the basis of
common characteristics of human body (Khan & Zhang, 2008). Biometric may be the
security measure for the future but this is not the time for the user to disregard their password
(Li & Hwang, 2010). Biometric offers another level of security; however, it is not foolproof.
The three reasons which cause as barriers in using biometric authentication includes –
1) Below are presented various extensive range of example –
Confidentiality
With the help of ATM (Automated teller machine), the account can access use the
card and PIN (personal identification number).
This will help the user to believe that host system will keep the PIN confidential
and during the transaction including the channel of communication between the
server of bank and host system.
Degree of significance of confidentiality – It may be called a compromise to the
account when the PIN is unsecured during the transaction. Therefore, it needs to
ensure that PIN should be clearly encrypted.
Integrity
Generally, while doing transactions, a user expects that those records related to
transaction with no accidental or malicious change. Hence, the actions performed
via the ATM must be linked to the account connected with the card.
Degree of significance of integrity – Think that $400 is withdrawn by user and
now $5600 the balance left in the customer. Instead of updating $5600 in the
account of user, unintentionally if it updated as $5000, it will lead to unexpected
amount loss. Hence, the integrity of the transactions should be secured as the
transactions performed directly impact the customer account.
Availability
It is very important that ATM machine needs to be available to serve the customer
whenever there is a requirement and at any given time (Narman et al, 2014).
Degree of significance of availability – It raises the economic growth of a bank,
therefore the ATM should be serviceable and operational almost all the time i.e.
99.98%.
2) The reasons where individuals might not prefer biometric authentic may include
various objectives. Biometrics is the authentication which offers security on the basis of
common characteristics of human body (Khan & Zhang, 2008). Biometric may be the
security measure for the future but this is not the time for the user to disregard their password
(Li & Hwang, 2010). Biometric offers another level of security; however, it is not foolproof.
The three reasons which cause as barriers in using biometric authentication includes –

IT MANAGEMENT 2
Cost factor – In comparison with other authentications methods, biometric are costly
to deploy. All biometric deployment needs of installation of their own hardware and
servers for the applications.
Points of failure – This type of authentication depend upon power and lightning for
their use and this can create issue while using login methods (Trojahn & Ortmeier,
2012). At any point in time, there can be complex with the authentication.
Accuracy – At many times, it was identified that these biometric authentication fails
to accurately validate the person's detail due to several factors (Sahoo, Choubisa &
Prasanna, 2012). In addition, lack of attention in the authentication of biometric may
result into negative outcomes.
To counter these objections, making available the biometric to the customer is more
accessible and flexible way by reducing the cost and also making it more flexible so as to
provide user-friendly interface. Considering cost barrier, proper evaluation needs to be
done before implementation of biometrics. In addition, assistance from financial
institutions can also be availed so as to effectively implement biometrics applications.
3) Below is the both scenario presented -
1 – As stated overhead, the bio-metrics applications are based on face recognition and during
emergency; it may high the proprietor of a safe. Considering the elements of biometrics, it is
not possible to effectively process the urgent requirement of funds and it leads to various
consequences of which the owner suffers and thus led to state as false negatives. It was also
recognised that negative approach in biometric may permit in retrieving location information.
Hence, it is defined that the individual will save in many databases. Moreover, it also happens
sometimes due to mechanical errors that an individual recognition cannot be retrieved
(Nathwani et al, 2016). Hence, the first issue which may be encountered is the hidden person
identity.
2 – This state results with hurting person substantially and developing condition near to
decease. The would be not much assistance to the staff who are having issue of cardiac arrest
and from other peers as biometric would not identify the same. On the other hand, it may lead
to higher medicinal injury to key staff and so play with the life similarly. This condition can
be perceived as false negative and can be proved unsafe for the whole workplace. Other issue
that can be identified is character loss of a person. It is possible that there could be various
Cost factor – In comparison with other authentications methods, biometric are costly
to deploy. All biometric deployment needs of installation of their own hardware and
servers for the applications.
Points of failure – This type of authentication depend upon power and lightning for
their use and this can create issue while using login methods (Trojahn & Ortmeier,
2012). At any point in time, there can be complex with the authentication.
Accuracy – At many times, it was identified that these biometric authentication fails
to accurately validate the person's detail due to several factors (Sahoo, Choubisa &
Prasanna, 2012). In addition, lack of attention in the authentication of biometric may
result into negative outcomes.
To counter these objections, making available the biometric to the customer is more
accessible and flexible way by reducing the cost and also making it more flexible so as to
provide user-friendly interface. Considering cost barrier, proper evaluation needs to be
done before implementation of biometrics. In addition, assistance from financial
institutions can also be availed so as to effectively implement biometrics applications.
3) Below is the both scenario presented -
1 – As stated overhead, the bio-metrics applications are based on face recognition and during
emergency; it may high the proprietor of a safe. Considering the elements of biometrics, it is
not possible to effectively process the urgent requirement of funds and it leads to various
consequences of which the owner suffers and thus led to state as false negatives. It was also
recognised that negative approach in biometric may permit in retrieving location information.
Hence, it is defined that the individual will save in many databases. Moreover, it also happens
sometimes due to mechanical errors that an individual recognition cannot be retrieved
(Nathwani et al, 2016). Hence, the first issue which may be encountered is the hidden person
identity.
2 – This state results with hurting person substantially and developing condition near to
decease. The would be not much assistance to the staff who are having issue of cardiac arrest
and from other peers as biometric would not identify the same. On the other hand, it may lead
to higher medicinal injury to key staff and so play with the life similarly. This condition can
be perceived as false negative and can be proved unsafe for the whole workplace. Other issue
that can be identified is character loss of a person. It is possible that there could be various
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

IT MANAGEMENT 3
numbers of illegal actions in relation to the operation of biometric. Considering the stage of
association, it comes up with re-establishing of various numbers of administrators which is
important for the particular idea or assumption.
numbers of illegal actions in relation to the operation of biometric. Considering the stage of
association, it comes up with re-establishing of various numbers of administrators which is
important for the particular idea or assumption.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IT MANAGEMENT 4
References
Khan, M. K., & Zhang, J. (2008). Multimodal face and fingerprint biometrics authentication
on space-limited tokens. Neurocomputing, 71(13-15), 3026-3031.
Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication
scheme using smart cards. Journal of Network and computer applications, 33(1), 1-5.
Narman, P., Franke, U., König, J., Buschle, M., & Ekstedt, M. (2014). Enterprise architecture
availability analysis using fault trees and stakeholder interviews. Enterprise
Information Systems, 8(1), 1-25.
Nathwani, J. N., Fiers, R. M., Ray, R. D., Witt, A. K., Law, K. E., DiMarco, S., & Pugh, C.
M. (2016). Relationship between technical errors and decision-making skills in the
junior resident. Journal of surgical education, 73(6), e84-e90.
Sahoo, S. K., Choubisa, T., & Prasanna, S. M. (2012). Multimodal biometric person
authentication: A review. IETE Technical Review, 29(1), 54-75.
Trojahn, M., & Ortmeier, F. (2012). Biometric authentication through a virtual keyboard for
smartphones. International Journal of Computer Science & Information
Technology, 4(5), 1.
References
Khan, M. K., & Zhang, J. (2008). Multimodal face and fingerprint biometrics authentication
on space-limited tokens. Neurocomputing, 71(13-15), 3026-3031.
Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication
scheme using smart cards. Journal of Network and computer applications, 33(1), 1-5.
Narman, P., Franke, U., König, J., Buschle, M., & Ekstedt, M. (2014). Enterprise architecture
availability analysis using fault trees and stakeholder interviews. Enterprise
Information Systems, 8(1), 1-25.
Nathwani, J. N., Fiers, R. M., Ray, R. D., Witt, A. K., Law, K. E., DiMarco, S., & Pugh, C.
M. (2016). Relationship between technical errors and decision-making skills in the
junior resident. Journal of surgical education, 73(6), e84-e90.
Sahoo, S. K., Choubisa, T., & Prasanna, S. M. (2012). Multimodal biometric person
authentication: A review. IETE Technical Review, 29(1), 54-75.
Trojahn, M., & Ortmeier, F. (2012). Biometric authentication through a virtual keyboard for
smartphones. International Journal of Computer Science & Information
Technology, 4(5), 1.
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




