Language:EN
Pages: 7
Words: 2629
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
which can help deter and detect internal security

Which can help deter and detect internal security attacks


Q1 a)

5. Why the data should be accessed:
The final consideration is why the data should be accessed. This will help to determine the level of security that is required and why the data should be protected. For example, customer data may need to be protected in order to prevent fraud or unauthorized access.


Q1 b)

1. Data classification:
The first element is data classification. This involves classifying data based on its sensitivity and importance. This will help to determine the level of security that is required and the best way to protect the data.

Q2

Biometrics identification technology is increasingly seen as a secure and reliable way to verify a person's identity, both in the government and commercial sectors. Answer the following questions:-
a) Define the Biometrics Authentication concept.

Overall, biometrics authentication is a more secure and convenient way to verify identity. It is less likely to lead to identity theft and is more convenient for users. However, the technology is still new and there are a few disadvantages.

b) List any THREE (3) Biometric characteristics commonly used in today's government and commercial sectors.

Facial recognition is the most recent biometric authentication method to be developed. It works by scanning a person's face and comparing it to a database of known faces. If there is a match, then the person's identity is verified.

c) Suggest ONE (1) example of a Biometrics System Application. With the aid of a diagram, explain how the operation of the system works.

Biometrics authentication, such as fingerprint recognition, is increasingly being seen as a more secure and convenient way to verify identity. It is less likely to lead to identity theft and is more convenient for users. However, the technology is still new and there are a few disadvantages.

Fingerprint recognition is one of the most common biometric authentication methods. It works by scanning a person's fingerprints and comparing them to a database of known fingerprints. If there is a match, then the person's identity is verified.

a) You are assigned to develop an access control policy for your company in order to determine access privileged for every staff. Discuss FOUR (4) access control requirements that need to be considered for protection against internal security attacks.

There are four access control requirements to consider when developing an access control policy to protect against internal security attacks:

b) An access control mechanism mediates between a user and system resources, such as applications, operating systems, firewalls, routers, files, and databases. In the context of access control, explain FOUR (4) types of access rights that can be granted related to the way in which a subject may access an object.

There are four types of access rights that can be granted related to the way in which a subject may access an object:

Q4

  1. With an appropriate example, describe the password authentication method.

b) Provide THREE (3) password vulnerabilities and their countermeasures.

1. Password Guessing: One vulnerability of passwords is that they can be guessed. This is especially true if the password is a common word or name. To counter this, it is important to choose a strong password that is not easily guessed. A strong password should be at least 8 characters long and include a mix of uppercase and lowercase letters, numbers, and symbols.

The Association for Computing Machinery (ACM) is a professional association for computer scientists and IT professionals. They have a code of ethics that members are expected to adhere to. The code covers topics such as professional responsibility, honest communication, and respecting the rights of others.

The Institute of Electrical and Electronics Engineers (IEEE) is another professional association for engineers and IT professionals. They also have a code of ethics that members are expected to follow. This code covers topics such as professional responsibility, honest communication, and treating others with respect.

Some software developers may feel that it is okay to use someone else's work without permission or attribution because they do not see the value in intellectual property. Others may feel that it is wrong to use someone else's work without permission or attribution because they see the value in intellectual property and they want to protect their own work. This can lead to conflict when software developers from different cultures work together.

One way to resolve this conflict is to have a clear understanding of the intellectual property laws in the country where the software will be used. This can help to ensure that everyone is on the same page with regard to what is and is not allowed. Another way to resolve this conflict is to have a clear understanding of the cultural differences and to respect the differences. This can help to ensure that everyone is able to work together without creating conflict.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Dr Clifford Schofield

PageId: DOC432B138