Discuss different types of threats and vulnerabilities

Assignment Help Other Subject
Reference no: EM132097134

Short answer questions

Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes.

a) Research into the different types of biometric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages of the three types below. Give an example application when each type could be used:
- Fingerprint
- Hand Geometry
- Iris Recognition

b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer.

c) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN.
Rationale
This assessment task will assess the following learning outcome/s:
- be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.
- be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.
- be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Part A

Introduction about Bio-Metric Systems

Fingerprint
Introduction about Fingerprint
Techniques and technologies used for Fingerprint
Advantages of using Fingerprint
Disadvantages of using Fingerprint

Hand Geometry
Introduction about Hand Geometry
Techniques and technologies used for Hand Geometry
Advantages of using Hand Geometry
Disadvantages of using Hand Geometry

Iris Recognition

Introduction about Iris Recognition

Techniques and technologies used for Iris Recognition

Advantages of using Iris Recognition

Disadvantages of using Iris Recognition

Part B

Introduction about Privacy-Enhancing Technologies

Research and discuss three Privacy-Enhancing Technologies (PETs) which can be used on the Internet

Use examples to illustrate your answer

Part C

Introduction about Wireless Sensor Networks

Discuss three different types of threats and vulnerabilities which can be used to attack the Wireless sensor networks (WSNs)

Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN

Verified Expert

"This is technical writeup assignment. It covers discussions on biometrics, including fingerprint, hand geometry etc. It also cover three PET or Privacy Enhancing technologies. And it covers attacks to wireless sensor networks."

Reference no: EM132097134

Questions Cloud

Determining the required rate of return of fingen : Fingen's 17-year, $1000 par value bonds pay 9 percent interest annually. The market price of the bonds is $920 and the market's required yield to maturity
What is the bond yield to maturity : The market price for $850 for a 10-year bond ($1000 par value) that pays 12 percent annual interest, but makes interest payments on a semiannual basis
Value of this bond if it paid interest annually : What would be the value of this bond if it paid interest annually? What about semiannually?
What would it mean if a stock had a beta of 1 : The market risk of a stock can be defined as the tendency for a stock to be correlated with, and move along with the general stock market.
Discuss different types of threats and vulnerabilities : Discuss three different types of threats and vulnerabilities which can be used to attack the Wireless sensor networks - Give your recommendations
Calculate the amount of monthly payment : Calculate the amount of your monthly payment. Round to the nearest dollar.
Current value of a share of augat common stock : What is the current value of a share of Augat common stock if its current dividend is $1.50 and dividends are expected to grow at the annual compound growth
Determining the yield to maturity : If you purchase the bonds for $1075, what is your yield to maturity?
Decision to raise price/output combinations in short term : U.S. retail industry, Arc Elasticity is correctly used to assess the dollar magnitude of net benefits of a decision to raise price/output combinations

Reviews

inf2097134

10/17/2018 11:37:08 PM

Good work done by team, very much satisfied. I had a good understanding of the topics and got the assignment before due date. Guys be ready for the next assignment and thank you for the present work.

len2097134

8/27/2018 3:56:28 AM

The grade you receive for this assessment as a whole is determined by the cumulative marks gained for each question. The tasks in this assessment involve a sequence of several steps and therefore you will be marked on the correctness of your answer as well as the clear and neat presentation of your diagrams, where required. Cover Page Table of contents Part A Introduction: 0.5 marks (0.5 marks) Each technique and technology explanation: 0.5 marks (1.5 marks) Each technique advantages with explanation: 0.5 marks (1.5 marks) Each technique disadvantages with explanation: 0.5 marks (1.5 marks) Total: 5 marks

Write a Review

Other Subject Questions & Answers

  How the system of checks and balances in the federal

Write an analysis of approximately 250 words on how the system of checks and balances in the federal government helps to limit the concentration of power.

  Generally accepted accounting principles

Financial statements are prepared using generally accepted accounting principles (GAAP). What group is responsible for establishing these principles, and what goals guide their formulation? Why are many generally accepted accounting principles likely..

  What the regular people would do with that dna storage

What the regular people would do with that "DNA Storage"? What government woul do with that "DNA Storage"? How is that helpful?

  Discuss the performance of the international community

Discuss the performance of the international community on the MDG's. Also, what do you think should be priorities for the new Post-2015 Goals currently being developed by the UN

  Elements of reasoning and intellectual standards option

Elements of Reasoning and Intellectual Standards Option A Using the 8 elements of reasoning that were outlined in week 2 (Purpose, problem, information, concepts, assumptions, inferences, points of view, implications or consequences) choose a news ar..

  How would you rule on the motion to suppress

Although interrogation without an attorney present about a charge which has been filed is prohibited by the Sixth Amendment.

  Suppose that the demand for plastic surgery is price

assume that the demand for plastic surgery is price inelastic. are the following statements true or false? explain your

  Diameter how far away is the cluster

The Pleidas, a star cluster in the constellation of Taurus the bull, appears about one finger width big in the sky. If one assumes the cluster to be about 7 light years in diameter how far away is the cluster? Give answer in units of light years.

  What storyboard are you reviewing

What storyboard are you reviewing? (If it has a link on the Internet, include that, or attach a PDF.) Is every step of the performance improvement process represented on the storyboard? Explain.

  List and explain the pros and cons of each program

List and explain the pros and cons of each program. Discuss the differences in methods used in the programs between youth and adults.

  Write a paper in which you consider what it would have

write a 300- to 350-word paper in which you consider what it would have been like to live under the threat of nuclear

  Ethical dilemma-the checkup

Post a response of at least 100 words to the ethical dilemma listed below. Make sure you support your response with evidence from the text (or another source). After your initial post, reply to the posts of at least two classmates.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd