Information and computer security - Assignment Example

Comments (0) Cite this document
Summary
The iris of an individual is one of biometrics currently being used to generate cryptographic keys for purposes of authentication and improved security of encrypted information. According to Daugmanm (2002), this is has been particularly achieved through the development and use…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Information and computer security
Read TextPreview

Extract of sample "Information and computer security"

Download file to see previous pages e biometric user authentication system whereby the system is able to undertake automated authentication of users based on the biometric traits of their iris. The system particularly combines with use of cryptographic keys with the distinctive biometric traits of iris to develop authentication algorithms that can be used to provide individuals with access permission to an information system or data. As opposed to the use of the traditional passwords and PINs, crypto-biometric systems such as the iris based cryptographic keys are significantly more stable and less susceptible to attacks. For example, the public key infrastructure (PKI) method of generation may use the iris biometric features to enhance the security of Private Key and protect the user authentication systems against potential intruders (Bowyer, Hollingsworth, and Flynn, 2006). This is a significant improvement on the traditional cryptosystems where user authentication primarily relies on the possession of secrete keys which may easily be forgotten, stolen or lost, and thus do not often provide nonrepudiation.
Generally, the use of iris may provide a number of advantages and solutions to some of these challenges facing the traditional cryptosystems. For example, iris based key generation method for cryptography together with generation algorithms can be used to effectively bind cryptographic keys with the biometric template of a user in such a way that makes it significantly impossible to reveal the key without a successful biometric authentication.
The process of using iris based key generation method for cryptography to develop a user authentication system usually involves a number of steps. Firstly, the biometric data of the iris of an individual is acquired using sensors and then the distinctive features are extracted before enrolling the user for biometric authentication. Next, the data is then used to generate cryptographic keys which can be released whenever an authorized user key presents ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information and computer security Assignment Example | Topics and Well Written Essays - 1500 words”, n.d.)
Information and computer security Assignment Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1692199-information-and-computer-security
(Information and Computer Security Assignment Example | Topics and Well Written Essays - 1500 Words)
Information and Computer Security Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1692199-information-and-computer-security.
“Information and Computer Security Assignment Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1692199-information-and-computer-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information and computer security

Computer Security

...? Computer security Threat Modeling Attack goals The attack goal in to access and view sensitive encrypted files stored in Alice’s laptop located in her workspace. Attacker The attacker is Charlie who can only access the physical location within 43 minutes only. He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran...
8 Pages(2000 words)Essay

Computer Security

...? In these papers ‘Why information security is hard’ by Ross Anderson and ‘The economics of information security’ by Ross Anderson and Tyler Moore wesee how a lot has been said about the lack of information security mechanisms to shield end users from scams and privacy violations. We also see aspects such as monopolistic gain, price discrimination and risk dumping as key drivers behind security system design. Furthermore it is brought to our attention how recent developments in economics of information security have led to the realization that a failure in security is...
3 Pages(750 words)Essay

Computer Security

...?Differences in the two papers with respect to approaches and conclusions The paper ed by MacCarthy on Information Security Policy in the U.S. Retail Payments Industry is a thorough analysis of the security policies which incorporates and evaluates the legal doctrines embraced by the players in the industry with regards to information security. The information security policies are evaluated as an economical idea; incorporating the impact of externalities which create inefficiencies and undermine incentives for investments in information security. The paper carefully examined the impact...
3 Pages(750 words)Essay

Computer security

...information confidential and of upholding the integrity and availability of resources; these three elements are often used to describe computer security goals (Stallings 2009). It is often associated with the three As: authentication, authorization and accountability. Security does not entail the elimination of every threat or vulnerability to the system; rather security implies that there is no such thing has 100% security, although one can get close to it. Computer security gives rise to the notion of protecting systems from a technological point of view, as well as making systems more...
6 Pages(1500 words)Essay

Computer Security

...personal information revelation behavior of millions of people to friends as well as complete strangers. Millions of people around the world use social networks like Friendster, MySpace, Facebook to communicate, find friends, dates and jobs – and in doing so they wittingly reveal highly personal information about themselves to everyone. With the burst in advertising of these social networks most of them now days encourage users to reveal highly personal information. This includes their dates of birth, cell phone numbers, addresses and highly confidential health information. The weak structural design of social networks in terms of security and access...
2 Pages(500 words)Essay

Computer Information Security Certification

...? Computer Information Security Certification s This paper seeks to identify various computer information security certifications available for professional within the IT sector. It will discuss the requirements for one to be certified and areas that one can receive certification. In addition the paper will evaluate the employment opportunities available after receiving certifications. Introduction Computers systems and networks face many security threats such as unauthorized access and intrusion. Consequently, it is critical to employ highly skilled persons on this area to guarantee safety of...
8 Pages(2000 words)Research Paper

Computer Security

...; and the subsequent establishment of a set of foundations that the thereafter work can be build upon. Organizations and individuals whose operations extensively dependent on the use of computers and their services do describe their needs for information security under major concepts of integrity, secrecy, availability and accountability of their required information. Therefore, every computer user has to make prompt decisions on what security as a measure means to him/ her. It is from this description of the user’s needs for security with his/ her personal computer of organizations’...
30 Pages(7500 words)Essay

Computer Security Information Risk Assessment & Security Management

...First Assignment. In today's world Computers are used to store and process a variety of confidential information like financial data, records of criminals and the crimes committed by them, medical history of patients, social security data, a company's personnel and payroll data, inventory and sales data, weather data, troops deployment data, missile deployment data, satellite surveillance obtained topographical data, etc. This data is considered confidential because access to the Computer and its data is supposed to be restricted to a limited number of users. This confidentiality can be compromised in a variety of ways. For example, integrity and confidentiality of...
4 Pages(1000 words)Essay

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data from their...
1 Pages(250 words)Essay

Computer security

...COMPUTER SCIENCES AND INFORMATION TECHNOLOGY ID, LAST A report on computer security licensing Computer sciences and information technology Name Student number Course code and title Date Executive Summary The report seeks to discuss computer security licensing as well as its contribution to technology to date. The report also attempts to study if the removal and elimination of the computer security measures lead to a step-down in the incidence of computer fraud. Similarly, the report discusses if it is ethical to teach solutions to the...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Information and computer security for FREE!

Contact Us