Skip to main content

Your task in this section is to

Short answer questions

Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes.

 

a) Research into the different types of biometric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages of the three types below. Give an example application when each type could be used: 

  • Fingerprint 
  • Hand Geometry
  • Iris Recognition  

[5 marks]

 

b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer. [5 marks]

 

c) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN. [5 marks].

Rationale

This assessment task will assess the following learning outcome/s:

  • be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.
  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.
  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

 

 

Marking criteria and standards

The grade you receive for this assessment as a whole is determined by the cumulative marks gained for each question. The tasks in this assessment involve a sequence of several steps and therefore you will be marked on the correctness of your answer as well as the clear and neat presentation of your diagrams, where required.

Cover Page

Table of contents

Part A

Introduction: 0.5 marks (0.5 marks)

Each technique and technology explanation: 0.5 marks (1.5 marks)

Each technique advantages with explanation: 0.5 marks (1.5 marks)

Each technique disadvantages with explanation: 0.5 marks (1.5 marks)

Total: 5 marks

Introduction about Bio-Metric Systems

Fingerprint

Introduction about Fingerprint

Techniques and technologies used for Fingerprint

Advantages of using Fingerprint

Disadvantages of using Fingerprint

Hand Geometry

Introduction about Hand Geometry

Techniques and technologies used for Hand Geometry

Advantages of using Hand Geometry

Disadvantages of using Hand Geometry

Iris Recognition 

Introduction about Iris Recognition

Techniques and technologies used for Iris Recognition

Advantages of using Iris Recognition

Disadvantages of using Iris Recognition

Part B

Introduction: 0.5 marks (0.5 marks)

Each Privacy-Enhancing Technology explanation: 1.0 mark (3.0 marks)

Each technology examples (atleast 2) : 0.5 marks (1.5 marks)

Total: 5 marks

Introduction about Privacy-Enhancing Technologies

Research and discuss three Privacy-Enhancing Technologies (PETs) which can be used on the Internet

Use examples to illustrate your answer

Part C

Introduction: 0.5 marks (0.5 marks)

Each threat and vulnerability explanation: 1.0 mark (3.0 marks)

Each recommendation: 0.5 marks (1.5 marks)

Total: 5 marks

Introduction about Wireless Sensor Networks

Discuss three different types of threats and vulnerabilities which can be used to attack the Wireless sensor networks (WSNs)

Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN

 

 

 

The post Your task in this section is to appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom

Do violent video games encourage players to become violent in real life?

 Write an outline for Speech 3, the persuasive belief speech, following the outline guidelines and formatting requirements (Do violent video games encourage players to become violent in real life?).  1000-1200 WORDS https://virtualspeech.com/blog/persuasive-speech-outline-structure-delivery Topics: https://blog.prepscholar.com/good-persuasive-speech-topics Do violent video games encourage players to become violent in real life? https://www.youtube.com/watch?v=YKKWOx43pIY WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU GET SOLUTION FOR THIS ASSIGNMENT,  Get Impressive Scores in Your Class CLICK HERE TO MAKE YOUR ORDER   on Do violent video games encourage players to become violent in real life? Are You looking for Assignment and Homework Writing help?  We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism. TO BE RE-WRITTEN FROM THE SCRATCH