720CB804-94BB-42D9-B1D3-D7FEA6CC95E5

.

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

H7162

Subject

Computer Science

Date

Dec 6, 2023

Type

Pages

1

Uploaded by SargentNewt2569 on coursehero.com

7:51 ol 56+ LD CYB 250 Discussion Four , Robert Maharaj posted Nov 12, 2023 2:27 PM W Subscribed Hi everyone, Adopting the latest Cybersecurity technologies enables organizations or individuals to enhance their security posture and mitigate risk. During Discussion One, | chose to discuss behavioral biometrics as a centralized workplace security technology. This technology used machine learning of algorithms to analyze individual user patterns or behaviors. The use of which can identify patterns that are uniquely different from each user. With the adoption of this new technology there are several key aspects to consider in regards to the CIA triad. Beginning with Availability, all software is prone to systematic failures or can become affected by natural disasters. It can further be affected if the user biometric data is compromised, as it cannot be reset and professional input would be required. When looking at confidentiality of the software a few items are notable including some users may not understand how their data is stored and have privacy-related concerns, and attackers can obtain biometric data without the targeted individuals consent or knowledge. For integrity, accuracy of the system is critical to tell each individual user apart and thwart off potential attackers. This can also be impacted by an attacker tampering with the system and uploading new biometric data. @ learn.snhu.edu
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help