McCurley-Shimer_Assignment #6
.docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
452
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
3
Uploaded by DeanHippopotamus5891
Assignment 6
1
Assignment 6
Alexus McCurley-Shimer
American Military University
ISSC 452 Cybersecurity
Professor Booth
December 13, 2023
Assignment 6
2
Biometrics has become a very common thing to use for security. Not only does
biometrics provide a user the sense of security it can make accessing data much easier. There are
many different types of biometrics that can be used. Though there are two categories of
biometrics such as physical and behavioral. In this paper we will be discussing the physical
biometrics which is the type that has many different types of biometrics authentication methods.
Iris recognition has become the most accurate of the biometric identification method.
(Aware, 2023) The iris recognition has four different steps that make it work. They are the image
capture, the image compression, the biometric template creating to match, and finally the
compliance check and the image enhancement. Cameras are used to capture photographs of a
individual’s eye and is able to map all the unique patterns of the iris to be able to identify the
individual. The reason that Iris recognition has seemed to become the most accurate is because
just like fingerprints no two individuals have the same patterns with both of these methods.
The least secure biometric type will be facial recognition. Comparing the many different
types of biometric authentication facial recognition is the least accurate. There are many different
reasons that affects the accuracy which are the poor lighting, sunglasses or any other objects, and
the low image resolution. (Clark, 2020) Not only do those stated above effect facial recognition
but age can affect facial recognition due to the fact that as time goes on the face changes. Other
reasons why facial recognition is not as accurate is the fact that facial expressions can change
and affect this type of biometrics.
Seeing the two different types of biometrics that are used for the most accurate to the
least has the understanding of what can affect biometrics. Though there are perks to each type of
biometric that is stated above there are some issues as well. Many factors can affect the accuracy
of biometrics. It seems that what affects biometrics is mostly environmental and natural.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Have you ever observed someone being harassed or bullied by someone else over the internet? What was your first reaction when you found out about the situation? How did you arrive at the judgment that the person had previously been the target of bullying behavior prior to your intervention?
arrow_forward
Have you ever witnessed someone being harassed or tormented by another person on the internet?
What was your initial reaction to the situation?
How did you determine that the individual was already being bullied before you intervened?
arrow_forward
More Malware! Ugh! For this question select a specific type of malware (Trojans Horses, Viruses, Worms, Ransomware) and identify the following (Do not use examples in the book!): What type it is (name the category of malware (see the parenthesis above). How does it infect a computer? How does it get into the computer (most common ways – not an exhaustive list); what does it do once it is there? Are there any well-known examples of this type of malware? Name at least one. Describe the damage done by it (cost of loss or number of systems affected or hack that occurred). What is the best defense against this type of malware? Explain.
arrow_forward
Have you ever seen someone being bullied or harassed online by another person?
What did you think of the scenario at first? How did you determine that the victim of
bullying was already being mistreated before you intervened?
arrow_forward
Title: Ransomware Attack and Prevention Strategies
Objective: The objective of this assignment is to research and propose prevention strategies for ransomware attacks, which have become a growing threat to individuals, organizations, and even governments.
Task:
Provide an overview of what ransomware attack are, including how they work and the motivation behind them. Present real-life examples of notable ransomware attacks and their impact on various entities. Explain the common vectors through which ransomware is delivered, such as phishing emails, malicious downloads, and vulnerabilities in software.
Present a range of preventive measures that individuals and organizations can take to minimize the risk of ransomware attacks. This could include regular software updates, employee training, and endpoint security solutions.
arrow_forward
True or false: The need to restrict access to data is privacy, and security is what we actually do to maintain privacy.
arrow_forward
Distinguish between the terms "protection" and "security."
arrow_forward
What exactly does the term "privacy" imply? Is there a way to keep your personal data safe?
arrow_forward
Have you ever seen someone being harassed or bullied by someone else over the internet? When you initially learned of the issue, what was the very first thing that went through your head? How did you get at the conclusion that the individual had been the target of bullying conduct prior to your intervention? In other words, how did you come to that conclusion?
arrow_forward
Does "cybersecurity" have any meaning or significance?
arrow_forward
Computer Science
Summarize how to conduct a forensic investigation, including critiquing a case.
arrow_forward
What is the benefit of using biometrics?
arrow_forward
Computer Science
Please use your own words
Why is Identity Theft so disastrous? Who does it affect? Have you ever been a victim or do you know someone who was a victim of ID theft? Did they ever recover their Identity? What did they do to recover whatever was lost? How might you prevent and/or mitigate it?
arrow_forward
During the early years of computers, what kind or types of security were most prevalent? Explain
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Have you ever observed someone being harassed or bullied by someone else over the internet? What was your first reaction when you found out about the situation? How did you arrive at the judgment that the person had previously been the target of bullying behavior prior to your intervention?arrow_forwardHave you ever witnessed someone being harassed or tormented by another person on the internet? What was your initial reaction to the situation? How did you determine that the individual was already being bullied before you intervened?arrow_forwardMore Malware! Ugh! For this question select a specific type of malware (Trojans Horses, Viruses, Worms, Ransomware) and identify the following (Do not use examples in the book!): What type it is (name the category of malware (see the parenthesis above). How does it infect a computer? How does it get into the computer (most common ways – not an exhaustive list); what does it do once it is there? Are there any well-known examples of this type of malware? Name at least one. Describe the damage done by it (cost of loss or number of systems affected or hack that occurred). What is the best defense against this type of malware? Explain.arrow_forward
- Have you ever seen someone being bullied or harassed online by another person? What did you think of the scenario at first? How did you determine that the victim of bullying was already being mistreated before you intervened?arrow_forwardTitle: Ransomware Attack and Prevention Strategies Objective: The objective of this assignment is to research and propose prevention strategies for ransomware attacks, which have become a growing threat to individuals, organizations, and even governments. Task: Provide an overview of what ransomware attack are, including how they work and the motivation behind them. Present real-life examples of notable ransomware attacks and their impact on various entities. Explain the common vectors through which ransomware is delivered, such as phishing emails, malicious downloads, and vulnerabilities in software. Present a range of preventive measures that individuals and organizations can take to minimize the risk of ransomware attacks. This could include regular software updates, employee training, and endpoint security solutions.arrow_forwardTrue or false: The need to restrict access to data is privacy, and security is what we actually do to maintain privacy.arrow_forward
- Distinguish between the terms "protection" and "security."arrow_forwardWhat exactly does the term "privacy" imply? Is there a way to keep your personal data safe?arrow_forwardHave you ever seen someone being harassed or bullied by someone else over the internet? When you initially learned of the issue, what was the very first thing that went through your head? How did you get at the conclusion that the individual had been the target of bullying conduct prior to your intervention? In other words, how did you come to that conclusion?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning