BIOMETRIC TECHNOLOGY
To secure and safeguard information, strategies for managing or monitoring access to information must be in place. You are already familiar with some access-restricting techniques such as passwords, encryption, and so forth. You have also probably used smartcards at some point to gain access. You might also have used fingerprint authentication to access a device, identify yourself, record attendance or open a gate.
Biometric technology can recognize and grant access to people based on physiological traits such as fingerprints, faces, and even DNA. Today, it can also recognize behavioral characteristics such as how you walk or speak. Clearly this has benefits for physical security, but how can biometric technology be used to fight cybercrime and cyber-related crimes?
For this Discussion, your challenge is to evaluate methods of applying biometric technology as a security measure against cybercrime. However, you must do so while considering the controversies the use of this technology raises.
RESOURCES
Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
WEEKLY RESOURCES
To prepare for this Discussion:
Review this week’s Learning Resources and videos on cybercrimes and prevention methods.
Seek other external resources on biometric authentication.
BY DAY 3
Post an initial post of 300–400 words in which you:
Analyze how you could use biometric technology to defend against cybercrime and cyber-related crimes in your own work environment, or one with which you are familiar.
Analyze specific examples of biometric technology used in cybersecurity. Be sure to give a brief summary of how that technology works to provide context.
Use your analysis to evaluate these security measures, and explain why they are (or are not) effective.
Use external credible and scholarly resources to support your post.
Refer to the Week 7 Discussion 1 Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.
Read a selection of your colleagues’ postings.
BY DAY 6
Respond to at least two of your colleagues in one or more of the following ways:
Make substantial follow-up posts. A substantial post:
oSufficiently responds to comments from the Instructor and other students who reviewed and commented on your work
oPresents a critical review of other students’ work and additional information/synthesis that adds to or increases the discussion
oContributes a personal experience/example that applies to the content
oExplores new aspects of the Discussion question, possibly using additional external sources, but remains focused on the topic
Provide sensitive and insightful feedback in a constructive manner.
Encourage further dialogue and discussion through open-ended questions.
Return to this Discussion to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.
Be sure to use APA formatting throughout and support your work with specific citations from this week’s Learning Resources and any additional sources.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
