Essays on Security Analyses Assignment

Download full paperFile format: .doc, available for editing

Word Count: Analysis 1- 1,122 Analysis 2- 1, 114 Analysis 3- 1, 172TABLE OF CONTENTSAnalysis 1 – Biometric Security: Biometric Benefits and Problems-3References-7Appendix-7Analysis 2 – Internet Security Analysis: SPAM Prevention and Technique-8Fighting SPAM with ISP-8Website Level Protection-9Individual Protection and Technique-10SPAM Protection in Development-10References-12Appendix-12Analysis 3 – Network Security: Security Implications of Honeypots-13Physical and Virtual Honeypot-13Types of Data Capture-14Importance of Data Analysis-15Other Views and Possibilities-15References-18Appendix-181. Analysis 1 Biometric Security: Biometric Benefits and ProblemsIdentification verification is a common task that has numerous “real life applications such as access control, transaction authentication in banking, and networking” (Marcel and Bengio, 2003, p. 1).

Biometrics is a method designed to recognize or authenticate individual using their physical distinctiveness such as handwriting, fingerprint, iris, voice, and other unique characteristic a human possess (Kang and Weimin, 2002, p. 1). This is more secure since biometric data remains the same over the course of a person’s life (Technovelgy-Article 16, n. d., p.1). It is like using your body as a “digital key” to enter a secured environment to acquire needed services and data (Grijpink, 2003, p. 1). Similar to other existing security systems, Biometrics security also entails some social issues that need to be address. Biometrics provides high level of protection against malicious attacks and identity fraud.

One of the major benefits of Biometrics against other security systems is the capture of biometric data into digital form. Digital is convenient, fast, easily shared, and provides boundless possibilities. The biometric technology provides a better alternative to passwords or PIN which can be stolen, guessed, lost, and usually forgotten. Ensures accountability since it is link to identity and not to something you learn or have knowledge of and most of all reduced paper works, convenience, and much greater control (Maxine, 2002, p. 5). However, some people are reluctant to accept the idea believing there maybe security holes that may compromise their privacy.

The possibility of an attack on the system to steal the captured data and use it to access that person’s account is a big concern. Another is database management and sharing which are also vulnerable to manipulation and theft (Kang and Weimin, p.4-5)The standardization of the Biometric Systems level procedures particularly database structure, is another issue that must be solve.

The data processing methods used in Biometric data capture are difficult to standardize since they normally differ for each company. This will cause interoperability problems when data is shared across different systems. Standard biometric testing and procedures are critical since they will provide people with much better perception of the biometric system and help them pick the own preference (Kang and Weimin, 2002, p. 6). Biometric systems according to Grijpink (2003) are susceptible to fraud. This means not specifically issues on equipments alone but on society and methods too.

He added that biometric readings do not guarantee precise images and therefore there is no assurance of accuracy. This is because the quality of biometric testing only depends on the suitability of certain parameters set to measure allowable discrepancies that can be still use to successfully identify the right person. This means the less accurate the configuration, the more likely the system identifies somebody else (p. 3).

Download full paperFile format: .doc, available for editing
Contact Us