StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometric Authentication, an Overview of the Telecom System Security - Assignment Example

Cite this document
Summary
From the paper "Biometric Authentication, an Overview of the Telecom System Security" it is clear that the password estimation patterns are observed when a network security attacker tries to get access to an official modem; however, the system deletes the attacker’s link after a small time period…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Biometric Authentication, an Overview of the Telecom System Security
Read Text Preview

Extract of sample "Biometric Authentication, an Overview of the Telecom System Security"

?DQWeek 5 By DQ1: Biometric Authentication Will biometric authentication methods be useful in the future? What kind of attacks could be mounted in practice? The biometric authentication is one of the very useful authentication techniques. It encompasses a wide variety of techniques for recognizing people by identifying one or more physicals features. Without a doubt, it is one of the future technologies that will offer a great deal of support in all the areas of life (Fustier & Burger, 2005). In addition, various researches show that the biometric authentication technology and methods will certainly be useful in the future. In fact, it is expected that this technology will become more persistent in every business as well as personal lives. At the present, the implementation of biometric authentication technology can be seen all around our lives for example at homes where normally an active biometric authentication sensor is used. When children return home and make use of the biometric sensor after playing in the mud and dirt whole day. In this scenario, this sensor can detect the dirt in hidden areas of the body to suggest much better wash. In the future, the use of biometric authentication sensor can be expected for car system where a family hoping to go anywhere. In this scenario, children will not be able to ignite the car without parents’ authentication to start the car (Reid, 2003; Kaschte, 2005). There might be some disadvantages of this technology but its advantages are so important and people want to benefit from them that the disadvantages will be more and more reduced in the future. In short, it can be said that the applications of biometric authentication technology will increase to a greater extent in the future. In fact, this technology will be supported among a variety of equipment by the some enhancement of the technologies and the decrease in the prices for software and hardware. In the future, it is expected that the biometric authentication will be used in various other areas of life such as ATMs, PDAs, access to Personal Computers and mobile phones, access to cars and buildings, DRM systems and many more we cannot even imagine (Kaschte, 2005; Bhattacharyya et al., 2009). From the above discussion it has been clear that the future of biometric authentication technology is bright but a number of security attacks on biometric authentication technology would also be increased in the future. It is possible that in future new and more sophisticated techniques emerge for breaking in biometric authentication systems. It is expected that in the future there will emerge a number of techniques that can be used to evade this technology (Waqas, 2009; Riha & Matyas, 2000). Moreover, some researches show that biometric systems are not ideal for security and as a result sometimes serious issues and errors can occur. In fact, with this technology it is possible that an authorized individual can be rejected by the system or that a non-authorized individual can be able to get authentication into the system. In the future, a variety of vulnerability techniques can be generated for biometric authenticated systems that can include fraud by incorporating some fooling and fraudulent methods (Waqas, 2009; Riha & Matyas, 2000).. Furthermore, another major issue with biometric authentication system is lack of support for platforms and systems. In fact, this kind of support is extremely limited and current standards are not properly followed. In this scenario, there can emerge a number of security attacks. In addition, it can lead to a great deal drastic situation where an attacker can smash the overall security of the system (Waqas, 2009; Riha & Matyas, 2000). DQ2: Sec Products Find a commercial or shareware product related to this weeks topic, describe how it works, and discuss its security. This section presents an overview of the telecom system security. For telecom system security the protection of telecommunications applications and systems is a significant scenario for numerous causes. Initially, a number of distributed systems completely depend on the basic mobile or fixed phone network in a way that is normally not understandable. In this scenario, keeping the history of safety malfunctions in the telecoms industry is useful. In the past, hasty attacks were performed on phone corporations through devotees or phone phreaks in an attempt to obtain free phone calls. After that telephone systems’ vulnerabilities started to be broken by hackers and spammers to avoid police wiretapping. Additionally, a lot of companies also offered premium rate calls those were offered to motive for large scale attacks and frauds. After sometime telecoms marketplaces were liberalized, a number of telecom businesses initiated security based attacks on other’s clients, as well as a number of telecom corporations have yet performed such security attacks against each other (Anderson, n.d; Douligeris & Kotzanikolaou, 2005). While talking about commercial or shareware product related telecom system security applications one of the basic solutions is the Firewall. In case of internet connection, a firewall is the basic tool to be installed on customary voice communications systems. Additionally, a telecom firewall security solution is a security structure that is driven through a security strategy describing whether to permit or reject certain phone calls. Though, such firewall system clearly passes permitted calls from their source to destination, however obviously terminates prohibited calls. In order to achieve high performance on the customary voice based communication network, the telecom voice firewalls have to be extremely dependable and incorporate no obvious latency to the voice and network traffic (Collier, 2004; Douligeris & Kotzanikolaou, 2005). In addition, there is another important technology based solution that is called Telecom VPNs. It is probable to snoop on network communication calls through PSTN. The suggested security management solution implants encryption facility in the telecom safety device. Such arrangement will offer a great deal of security and privacy of network calls (Collier, 2004; Douligeris & Kotzanikolaou, 2005). Another technology based solution is the telecom intrusion detection and prevention systems. This is also called IDS that checks and monitors network traffic for offensive call patterns, comprising tolls fraud, war dialing and password guessing. In this scenario war dialing outlines are observed when a network attacker places short calls to various numbers inside the corporation in a search for network modems. In addition, toll-fraud models are observed when there is a strange or illegal usage of long-distance network service, frequently from or to a new source as well as destination. Additionally, the password estimation patterns are observed when a network security attacker tries to get access to an official modem; however the system deletes the attacker’s link after a small time period for the reason that of numerous failed password efforts (Collier, 2004). References Anderson, R., n.d. Telecom System Security. [Online] Available at: http://www.cl.cam.ac.uk/~rja14/Papers/SE-17.pdf [Accessed 01 August 2012]. Bhattacharyya, D., Ranjan, R., A, F.A. & Choi, M., 2009. Biometric Authentication: A Review. International Journal of u- and e- Service, Science and Technology, 2(3), pp.13-28. Collier, M.D., 2004. Enterprise Telecom Security Solutions. [Online] Available at: http://download.securelogix.com/library/Enterprise_Telecom_Security_Solutions_Draft_10-12-04.pdf [Accessed 31 July 2012]. Douligeris, C. & Kotzanikolaou, P., 2005. Network Security. [Online] Available at: http://www.eolss.net/Sample-Chapters/C05/E6-108-21-00.pdf [Accessed 01 August 2012]. Fustier, A. & Burger, V., 2005. Internet Security and Privacy. [Online] Available at: http://web.it.kth.se/~johanmon/attic/2g1704/reports/biometrics.pdf [Accessed 01 August 2012]. Kaschte, B., 2005. Biometric authentication systems today and in the future. [Online] Available at: http://www.cs.auckland.ac.nz/courses/compsci725s2c/archive/termpapers/bkaschte.pdf [Accessed 02 August 2012]. Reid, P., 2003. Biometrics for Network Security. London: Prentice Hall. Riha, Z. & Matyas, V., 2000. Biometric Authentication Systems. [Online] Available at: http://www.fi.muni.cz/reports/files/older/FIMU-RS-2000-08.pdf [Accessed 30 July 2012]. Waqas, 2009. Future of Biometric Authentication Methods. [Online] Available at: http://www.pmbatch.com/blog/future-biometric-authentication-methods/ [Accessed 30 July 2012]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“DQWeek 5 technology essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
DQWeek 5 technology essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1455415-dqweek
(DQWeek 5 Technology Essay Example | Topics and Well Written Essays - 1000 Words)
DQWeek 5 Technology Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1455415-dqweek.
“DQWeek 5 Technology Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1455415-dqweek.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometric Authentication, an Overview of the Telecom System Security

Biometric Authentication

According to the research findings, provided people require security for their critical assets, which has proven to be an uphill task in the contemporary society, dedicated biometric solution (DBS) will play a vital role in ensuring the same.... DBS is thus an effective technology offering optimal solutions towards the safety of responsive areas, thereby meeting the demands of the clients for high security whilst maintaining litheness (Nanavati et al 2002).... DBS remains a complex system of identification....
7 Pages (1750 words) Essay

Iris recognition system using principal component analysis

overview of project 2.... Iris recognition system using principal component analysis Abstract Iris recognition has been a challenge in the past with the recognition accuracy being low.... This project has implemented an iris recognition system using image processing.... Human Iris system 2.... “A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual” (Majumder, Ray, & Singh, 2009)....
60 Pages (15000 words) Dissertation

Computer Physical Security

The tests made by the International Computer security Association (ICSA) have allowed to issue certificates to rather limited number of systems of biometric identification.... In particular the protection system can check up your finger-print, figure of your retina, spectral characteristics of your voice and other characteristics.... So we may define a biometric system as 'a pattern recognition system which recognizes a user by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user'2....
4 Pages (1000 words) Essay

Information System Security

For ensuring system security, an organisation ought to implement an efficient security model and carry out certain analyses and implementation steps.... However, it is alarming that it is becoming increasingly threatened by security threats including viruses, hackers, and human error.... Because such threats represent destructive repercussions on productivity and… There is a gradual and certain acknowledgment of the stakes involved with ensuring effectual security management....
56 Pages (14000 words) Essay

Security - Network Design

Any misuse or fraud will render the owner of the… Network security has assumed paramount proportions as intrusions are on the rise, whether accidental or malicious, and the research problem raised in the paper are to investigate the preventive methods in this Literature Review reveals that there is more to security than just putting up defences.... It also relates to the psychology of security that adds to the threat instead of obviating it....
54 Pages (13500 words) Essay

Biometric Authentication Systems

The paper "biometric authentication Systems" tells about new technologies that are highly accurate, reliable, and not intrusive to the users.... The need for reliability has led to heightened concerns about security increased advancements in communication, mobility, and networking.... practical biometric system should consider the following before it can be effected.... ircumvention – it refers to the ease with which the biometric system can be fraudulently accessed or altered....
10 Pages (2500 words) Essay

Fingerprint Biometrics

nbsp;Fingerprint biometric-based identification system is one of the oldest techniques which have been effectively employed in a wide variety of departments.... Hence, a reliable identity management system is an important element of a wide variety of applications that render their systems and services simply to legitimate clients.... However, the major objective of an identity management system is to identify a user through the individual's characteristics....
6 Pages (1500 words) Research Paper

Biometric Authentication

This assignment "biometric authentication" presents leading-edge approaches to role-based authentication.... hellip; A combination of these security measures would be necessary at the DoD to ensure that not only authorized users access the system but also that their activities are authenticated and data transmitted in secure ways.... Whereas this has been happening through security tools such as access cards, passwords, and tokens, these systems have proven to be ineffective as they can be forgotten, duplicated, shared, or stolen (Weicheng Shen, 1999)....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us