Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and...

1 answer below »

Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes.



a) Research into the different types of bio-metric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages for the three types below. Give an example application when each type could be used:



  • Fingerprint

  • Hand Geometry

  • Iris Recognition


[5 marks]



b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer. [5 marks]



a) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN. [5 marks].


Rationale



back to top


This assessment task will assess the following learning outcomes:



  • be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.

  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.

  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.


Marking criteria and standards



back to top


The grade you receive for this assessment as a whole is determined by the cumulative marks gained for each question. The tasks in this assessment involve a sequence of several steps and therefore you will be marked on the correctness of your answer as well as clear and neat presentation of your diagrams, where required.



Part 1 - Online Quiz


This part is a series of multiple choice questions. Each correct answer will score 1 mark. Marks will not be deducted for incorrect answers.


Most quizzes will involve multiple choice or true/false type questions, although quizzes may include other contents. Marks will be given based on the correctness of the answers. The Test Centre will be marking automatically and you will receive marks according to the following criteria:
HD - At least 85% answers were correct
DI - At least 75% answers were correct
CR - At least 65% answers were correct
PS - At least 50% answers were correct



Part 2 - Short answer questions





Presentation



back to top


For Part 2, you are recommended to write the answers in a word document and submit it via TURNITIN.


Your answers to the questions should be precise but complete and informative.


Each question should be answered individually with the corresponding label to indicate the tasks completed.


Task-2 short answer questions should be precise but complete and informative and the number or words within 1500 -1800 words.

Answered Same DayAug 20, 2020ITC596Charles Sturt University

Answer To: Your task in this section is to prepare a response to each of the questions. Please refer to the...

Ankit answered on Aug 25 2020
136 Votes
2
                
Student_Id
                Student_Name
                Title of assignment
            
Table of Contents
Biometric Systems     3
Fingerprint     3
Techniques and technologies used for fingerprint     3-4
Advantages of fingerprint    4
Disadvantages of fingerprint    4-5
Example application     5
Hand Geometry    5
Techniques and technologies used for hand geometry    5
Advantages of hand geometry    5
Dis
advantages of hand geometry    5
Example application    6
c) Iris Recognition     6
Techniques and technologies used for Iris Recognition    6
Advantages of Iris Recognition    6
Disadvantages of Iris Recognition    7
Example application    7
Privacy Enhancing Technologies used on the internet     7
Introduction on PET used on the internet     7
Privacy Research and discuss 3 PET’s …………………………………………………… 7-8
Enhancing Technologies used on the internet     7-8
Example to illustrate your answer     8
Wireless Sensor networks     8
Introduction on Wireless sensor     8
Research and discuss 3 types of Threats …………..………………………………………..9
Recommendations     9
References..............................................................................................................................10
Biometric system
Biometric system is a computerized strategy that removes the attacks on server or network by recognizing the humans which are rely on either behavioral or physiological features of individual. This method depends on different physical features of human, for example, recognizing of human voice, fingerprints, eye recognizing, diverse facial pattern and so on. The different features of physiological biometric framework comprise of state of body, weight, tallness, eye shape, the example of face, the skin or thumbs shape or fingerprints. The different features of behavioral biometric framework comprise of recognizing of human voice, human additionally has the keystroke arrangement and furthermore incorporates the mark and signature.
a) Fingerprint: Fingerprint is type of frameworks that are one of the most regularly utilized in our general field due to their simplicity of establishment and their demonstrated adequacy for access control. The most popular manners by which biometrics were utilized to help attacker’s examinations, fingerprints has been being used in the year1900. It is built by Sir Edward Henry in London, England as an approach to recognize attackers. Presently, thumb recognition and fingerprint recognition advances are a basic element for some business security frameworks. [Securecomm 2017]
Techniques and technologies used for fingerprint
There are two basic techniques for scanning fingers. The working of optical scanner is by using dark a splendid ray on distinct finger impression and capturing what is adequately a digital image. On the off chance that user at any point digital copied their finger; user may understand shortly regarding it is working. Often providing a grimy dark digital copy, the image bolsters inside computer scanner. The finger printer deploys a light-elegant microchip that consists of CCD, charge-coupled gadget, or a CMOS picture sensor to deliver a computerized picture. The PC breaks down the picture consequently, choosing only the unique mark, and after that utilizations advanced pattern-matching tool to convert this into a code.
“The type of scanner is capacitive scanner that determines fingers of user electrically. When user finger lays on a surface at some point, the edges in their fingerprints contact the surface whereas the hollows between the edges stand marginally clear of it. At the end of the day, there are fluctuating separations between each piece of user finger and the surface underneath. A capacitive scanner develops a photo of user unique finger impression by estimating...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here