Analyze how you could use biometric technology to defend against cybercrime and cyber-related crimes in your own work environment, or one with which you are familiar
BIOMETRIC TECHNOLOGY
To secure and safeguard information, strategies for managing or monitoring access to information must be in place. You are already familiar with some access-restricting techniques such as passwords, encryption, and so forth. You have also probably used smartcards at some point to gain access. You might also have used fingerprint authentication to access a device, identify yourself, record attendance or open a gate.
Biometric technology can recognize and grant access to people based on physiological traits such as fingerprints, faces, and even DNA. Today, it can also recognize behavioral characteristics such as how you walk or speak. Clearly this has benefits for physical security, but how can biometric technology be used to fight cybercrime and cyber-related crimes?
For this Discussion, your challenge is to evaluate methods of applying biometric technology as a security measure against cybercrime. However, you must do so while considering the controversies the use of this technology raises.
RESOURCES
Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
WEEKLY RESOURCES
To prepare for this Discussion:
• Review this week’s Learning Resources and videos on cybercrimes and prevention methods.
• Seek other external resources on biometric authentication.
BY DAY 3
Post an initial post of 300–400 words in which you:
• Analyze how you could use biometric technology to defend against cybercrime and cyber-related crimes in your own work environment, or one with which you are familiar.
• Analyze specific examples of biometric technology used in cybersecurity. Be sure to give a brief summary of how that technology works to provide context.
• Use your analysis to evaluate these security measures, and explain why they are (or are not) effective.
• Use external credible and scholarly resources to support your post.
Refer to the Week 7 Discussion 1 Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.
Read a selection of your colleagues’ postings.
BY DAY 6
Respond to at least two of your colleagues in one or more of the following ways:
• Make substantial follow-up posts. A substantial post:
o Sufficiently responds to comments from the Instructor and other students who reviewed and commented on your work
o Presents a critical review of other students’ work and additional information/synthesis that adds to or increases the discussion
o Contributes a personal experience/example that applies to the content
o Explores new aspects of the Discussion question, possibly using additional external sources, but remains focused on the topic
• Provide sensitive and insightful feedback in a constructive manner.
• Encourage further dialogue and discussion through open-ended questions.
Return to this Discussion to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.
Be sure to use APA formatting throughout and support your work with specific citations from this week’s Learning Resources and any additional sources.
LEARNING RESOURCES
Required Readings
• Turban, E., Pollard, C., & Wood, G. (2021). Information technology for management: Driving digital transformation to enhance local and global performance, growth and sustainability (12th ed.). Wiley.
o Chapter 5, “Data Privacy and Cyber Security” (pp. 149–198)
• Greengard, S. (2016). Cybersecurity gets smartLinks to an external site.. Communications of the ACM, 59(5), 29–31. https://doi.org/10.1145/2898969
• Shein, E. (2015). Companies proactively seek out internal threatsLinks to an external site.. Communications of the ACM, 58(11), 15¬–17. https://doi.org/10.1145/2820423
Required Media
• Walden University, LLC. (2017). Introduction to cybercrime [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 4 minutes.
• Walden University, LLC. (2017). Cybercrime case studies [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 10 minutes.
• Walden University, LLC. (2017). Protection against cybercrime [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 6 minutes.
• Walden University, LLC. (2017). Incorporating cyber security in an it security risk management environment [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 7 minutes.
• Barlow, C. (2016, November). Where is cybercrime really coming from?Links to an external site. [Video]. TED. https://www.ted.com/talks/caleb_barlow_where_is_cybercrime_really_coming_from
Note: The approximate length of this media piece is 14 minutes.
Optional Resources
• FBI Internet Crime Complaint Center (IC3)Links to an external site.. (n.d.). https://www.ic3.gov
• Get Safe OnlineLinks to an external site.. (2019). https://www.getsafeonline.org/
• HM Government. (n.d.). Cyber awareLinks to an external site.. https://www.cyberaware.gov.uk/
• Larson, S. (2017). Massive cyberattack targeting 99 countries causes sweeping havocLinks to an external site.. CNN Business. http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/index.html
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
