Short answer questions
Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes.
a) Research into the different types of biometric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages of the three types below. Give an example application when each type could be used:
- Fingerprint
- Hand Geometry
- Iris Recognition
[5 marks]
b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer. [5 marks]
c) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN. [5 marks].
Rationale
This assessment task will assess the following learning outcome/s:
- be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.
- be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.
- be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.
Marking criteria and standards
The grade you receive for this assessment as a whole is determined by the cumulative marks gained for each question. The tasks in this assessment involve a sequence of several steps and therefore you will be marked on the correctness of your answer as well as the clear and neat presentation of your diagrams, where required.
Cover Page
Table of contents
Part A
Introduction: 0.5 marks (0.5 marks)
Each technique and technology explanation: 0.5 marks (1.5 marks)
Each technique advantages with explanation: 0.5 marks (1.5 marks)
Each technique disadvantages with explanation: 0.5 marks (1.5 marks)
Total: 5 marks
Introduction about Bio-Metric Systems
Fingerprint
Introduction about Fingerprint
Techniques and technologies used for Fingerprint
Advantages of using Fingerprint
Disadvantages of using Fingerprint
Hand Geometry
Introduction about Hand Geometry
Techniques and technologies used for Hand Geometry
Advantages of using Hand Geometry
Disadvantages of using Hand Geometry
Iris Recognition
Introduction about Iris Recognition
Techniques and technologies used for Iris Recognition
Advantages of using Iris Recognition
Disadvantages of using Iris Recognition
Part B
Introduction: 0.5 marks (0.5 marks)
Each Privacy-Enhancing Technology explanation: 1.0 mark (3.0 marks)
Each technology examples (atleast 2) : 0.5 marks (1.5 marks)
Total: 5 marks
Introduction about Privacy-Enhancing Technologies
Research and discuss three Privacy-Enhancing Technologies (PETs) which can be used on the Internet
Use examples to illustrate your answer
Part C
Introduction: 0.5 marks (0.5 marks)
Each threat and vulnerability explanation: 1.0 mark (3.0 marks)
Each recommendation: 0.5 marks (1.5 marks)
Total: 5 marks
Introduction about Wireless Sensor Networks
Discuss three different types of threats and vulnerabilities which can be used to attack the Wireless sensor networks (WSNs)
Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN
The post Your task in this section is to appeared first on My Assignment Tutor.
-
- Assignment status: Resolved by our Writing Team
- Source@PrimeWritersBay.com
Comments
Post a Comment