Skip to main content

Your task in this section is to

Short answer questions

Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes.

 

a) Research into the different types of biometric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages of the three types below. Give an example application when each type could be used: 

  • Fingerprint 
  • Hand Geometry
  • Iris Recognition  

[5 marks]

 

b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer. [5 marks]

 

c) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN. [5 marks].

Rationale

This assessment task will assess the following learning outcome/s:

  • be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.
  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.
  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

 

 

Marking criteria and standards

The grade you receive for this assessment as a whole is determined by the cumulative marks gained for each question. The tasks in this assessment involve a sequence of several steps and therefore you will be marked on the correctness of your answer as well as the clear and neat presentation of your diagrams, where required.

Cover Page

Table of contents

Part A

Introduction: 0.5 marks (0.5 marks)

Each technique and technology explanation: 0.5 marks (1.5 marks)

Each technique advantages with explanation: 0.5 marks (1.5 marks)

Each technique disadvantages with explanation: 0.5 marks (1.5 marks)

Total: 5 marks

Introduction about Bio-Metric Systems

Fingerprint

Introduction about Fingerprint

Techniques and technologies used for Fingerprint

Advantages of using Fingerprint

Disadvantages of using Fingerprint

Hand Geometry

Introduction about Hand Geometry

Techniques and technologies used for Hand Geometry

Advantages of using Hand Geometry

Disadvantages of using Hand Geometry

Iris Recognition 

Introduction about Iris Recognition

Techniques and technologies used for Iris Recognition

Advantages of using Iris Recognition

Disadvantages of using Iris Recognition

Part B

Introduction: 0.5 marks (0.5 marks)

Each Privacy-Enhancing Technology explanation: 1.0 mark (3.0 marks)

Each technology examples (atleast 2) : 0.5 marks (1.5 marks)

Total: 5 marks

Introduction about Privacy-Enhancing Technologies

Research and discuss three Privacy-Enhancing Technologies (PETs) which can be used on the Internet

Use examples to illustrate your answer

Part C

Introduction: 0.5 marks (0.5 marks)

Each threat and vulnerability explanation: 1.0 mark (3.0 marks)

Each recommendation: 0.5 marks (1.5 marks)

Total: 5 marks

Introduction about Wireless Sensor Networks

Discuss three different types of threats and vulnerabilities which can be used to attack the Wireless sensor networks (WSNs)

Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN

 

 

 

The post Your task in this section is to appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM