Research into the different types of bio-metric systems

Assignment Help Management Information Sys
Reference no: EM132095495

Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes.

a) Research into the different types of bio-metric systems which are currently available for access control systems.

Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages for the three types below. Give an example application when each type could be used:

Fingerprint

Hand Geometry

Iris Recognition

b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right.

Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer.

a) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack.

Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN.

Rationale

back to top

This assessment task will assess the following learning outcomes:

be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.

be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.

be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Marking criteria and standards

For Part 2, you are recommended to write the answers in a word document and submit it via TURNITIN.

Your answers to the questions should be precise but complete and informative.

Each question should be answered individually with the corresponding label to indicate the tasks completed.

Task-2 short answer questions should be precise but complete and informative and the number or words within 1500 -1800 words.

Reference no: EM132095495

Questions Cloud

Determine how well that cow performs compared to others : The app should be based on a multi-page template structure. A number of individual cows exist for each species and an ID number is used to identify these
What things you assume are already true about the area : Assumptions that you make related to the area of focus of the project or of the study - what things you assume are already true about the area of focus.
What we can do to counter the biological attack : For this assignment, submit a short 500 word write-up responding to the following question: A terrorist threat has been made via phone against the water system.
Relevant data for presenting in a visual format : From the results of your analysis, identify relevant data for presenting in a visual format, You should choose two different sets of data
Research into the different types of bio-metric systems : Research into the different types of bio-metric systems which are currently available for access control systems.
Describe the different types of operating systems : Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone.
Examine the processing hardware requirements for blu-ray : Examine the processing hardware requirements for both the HD-DVD and Blu-ray. Compare and contrast the similarities and differences of each.
Watching the pike place fish market video : After watching the Pike Place Fish Market video, choose one of the following people and determine which quadrant from the support
Defining four important tactical tasks for a negotiator : What are four important tactical tasks for a negotiator in a distributive situation to consider? For each discussion, you are required to write an initial post.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Available technologies used for auditing

Describe at least three commercially available technologies used for Auditing and describe how each works

  Prepare an ER diagram for the database

CSE1IS - Information Systems Assignment. Prepare an ER diagram for the database. Follow the correct notations for the diagram. All relationships must be labelled with cardinality information

  Demonstrate successful collaboration

What has this organization done to gain and sustain an advantage over their competitors?

  Explain risk management and its associated activities

Explain risk management and its associated activities and defend the need for a risk management plan.

  What other issues that may occur when using ppe

What other issues that may occur when using PPE? What would you do if you were unable to eliminate these fears?

  Explain the scope and analyze how to control the scope

Describe the scope and analyze how to control the scope. Speculate and give justifications for how to control scope. Identify possible risks, constraints, and assumptions.

  What problems have you had managing your school workload

Looking back on your IT program, what problems have you had managing or balancing your school workload with the demands of your work and personal life?

  How could a university organize its business education

How could a university organize its business education around business processes rather than business functions? What would be the benefits to students?

  Your relationship with the unethical person

This assignment asks you to consider ethics and whistleblowers. Select one of the behaviors listed below for your discussion posting.

  Explain information management

Explain information management. Why do organizations still have information deficiency problem?

  Payroll cycle- harware and software controlsin respects to

payroll cycle- harware and software controlsin respects to the payroll cycle - think of what hardware and software

  Show the role of information systems

Information Systems Role - Show the role of information systems in achieving excellence in healthcare service.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd