preview

Using Biometric Or Two Factor Verification

Decent Essays

#1) As technology evolves and continues to deeper integrated within businesses so does the ingenuity of attackers and threats. In order to provide a barrier on which stakeholders can rely on there must be the implementation of a system that serves as a means to information assurance. Information assurance, through addressing confidentiality, integrity, and availability of data serves to provide the business environment with the confidence needed to further its pursuits in the sometime sketchy world of the internet of things. Confidentiality of data speaks to the business need of ensuring that data, within a given environment, is protected by a set of policies, procedures and business practices that have the goal of limiting data access to authorized parties. An example of proactively enforcing confidentiality is the use of biometric or two-factor verification. However, keeping data confidential is not enough, the systems being used must be designed so that data can maintain its integrity. The goal of data integrity is to ensure consistently accurate data as it flows between various networks and systems. An example of a control that seeks to maintain the integrity of data is to have a backup system in place that may be used in the case of an emergency disruption which is commonly part of BCDR planning. With confidentiality and integrity addressed the data now needs to be available when needed. Availability of data can be provided through the use of controls such as physical

Get Access