Information Systems Security and Privacy: A Case Study Report

Verified

Added on  2022/10/18

|3
|431
|10
Report
AI Summary
This report explores the privacy and security concerns associated with managing information systems, specifically focusing on the use of biometric data, such as iris scanning. The report highlights the potential vulnerabilities of storing sensitive personal information, such as the interior structure of a person’s eye, in databases. It discusses the risks of data hacking and unauthorized access, emphasizing the importance of robust security measures to protect against identity theft and misuse of personal information. The report references research on biometric systems and their applications, underscoring the need for careful consideration of privacy implications when designing and implementing these technologies. The document emphasizes the need to protect biometric data to prevent misuse of legal documents or illegal records. The report concludes by mentioning that iris scan is considered as part of the multi-factor authentication and secured method until the human information is hacked by the hacker.
Document Page
Running head: MANAGING INFORMATION SYSTEMS
Managing Information Systems
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1MANAGING INFORMATION SYSTEMS
Databases of human traits used to maintain corporate security may actually
pose a privacy threat to individuals
In case of the eye scanning device, it records interior structure of the person’s eye as well
as stores image into the database. The databases of human traits can continue corporate security
and position privacy threats to the entities. These concerns are justified. The collection of data
could be hacked if anyone can get photo of iris image (Okokpujie et al. 2017). Higher profile
data is always a target of the hackers, therefore it is required to keep secured in stronger levels.
The data of human traits stored into the biometric database can be vulnerable as
compared to any kind of data. There are no changes into the iris scanning. Once the biometric
data is being compromised, then it takes longer time to control. There is possibility of physical
identity to be duplicated (Bansal, Agarwal, & Sharma, 2015). The criminal can take higher
resolution image of the eye and copy of it. That information of humans is used to hack the
person’s information in the devices and accounts.
Good and bad of the biometric system is based on how it is developed as well as
designed. Hacking of those data is a major security threat. The biometric can reveal portion of
the uniqueness of users, and if it is stolen, it is use to misrepresent the legal documents and
illegal records which cause more harm as associated to stolen credit card or numeral. Iris scan is
considered as part of the multi-factor authentication and secured method until the human
information is hacked by the hacker.
Document Page
2MANAGING INFORMATION SYSTEMS
References
Bansal, A., Agarwal, R., & Sharma, R. K. (2015). Determining diabetes using iris recognition
system. International journal of diabetes in developing countries, 35(4), 432-438.
Okokpujie, K. O., Noma-Osaghae, E., Okesola, O. J., John, S. N., & Robert, O. (2017,
December). Design and implementation of a student attendance system using iris
biometric recognition. In 2017 International Conference on Computational Science and
Computational Intelligence (CSCI)(pp. 563-567). IEEE.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]