Thursday, October 17, 2019
Case Study Lucy and Peter at the GP Essay Example | Topics and Well Written Essays - 3000 words
Case Study Lucy and Peter at the GP - Essay Example Science has utilized the use of biometrics to safeguard information. In a particular case, the examination of the use of biometrics and the dispensation of information via technology will be discussed. Then, a discussion will be made upon the ethics of the usage of such systems as well as the exploitation of the lacklustre security. Security over things worth protecting has been a significant driving force in technology development as well as policy proliferation. Scientists and lawmakers have joined their efforts to protect identity and fiscal assets. However, through pillaging of cyberspace hackers as well as authorized utilization and viewing of sensitive information has ran rampant on every level. The attacks on military and financial districts of the United States on September 11 gave lawmakers all over the world, especially industrialized countries (i.e. Europe and the United States), a renewed impetus to strengthen security on all levels. Biometrics and other related mechanisms have provided a means to aid in security. Biometrics is the development of statistical and mathematical methods application to data analysis problems in the biological sciences. The form of measurement is used specifically penal and corporate identification systems to protect privileged and sensitive information. ... The Greeks used almost the same methodology but in cunning and precise manner. Now, digital hand prints and eye identification are the standard as well as highest form of security to date to protect sensitive information and financial investments. (Tapscott, pg. 43) False positive tests are made to secure the identity of all constituents involved. Non-repudiation In electronic commercial transactions such as the ATM, all constituents in a transaction must be assured their security is not infringed upon. Via authentication of all parties, a transaction could be made in full confidence. Systems are programmed to make prevent any concerned parties from repudiating a transaction prior to their agreement in a form of digital signatures. Cryptographic hash function Cryptographic hash function is used for information security cryptographic hash function is to translate and transcribe an original writing or picture into an algorithmic form or a "digital fingerprint" for data. The code that represents the actual artefact is conveyed in hash sums. Devices that utilize this method expeditiously dispense information without revealing information. Each hash function must have its own distinct algorithmic, code. Distinction is important inasmuch as it mitigates confusion between two people. Inasmuch as all constituents, to a transaction wish that transaction to be secure, electronic devices must authenticate all constituents to prevent any interlopers. Also, devices, such as ATM machines must prevent parties to electronically renege their transaction. To consolidate trust, the implementation of digital signatures has been heavily utilized. (Cranor, pg 30) Polyalphabetic substitution Among the most original and often
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.