Sunday, May 5, 2019

Case Study Lucy and Peter at the GP Essay Example | Topics and Well Written Essays - 3000 words

Case Study Lucy and Peter at the GP - Essay ExampleScience has utilized the use of biometrics to safeguard in levelation. In a particular case, the examination of the use of biometrics and the dispensation of information via technology will be discussed. Then, a discourse will be do upon the ethics of the usage of such systems as well as the ontogeny of the lacklustre security.Security over things worth entertaining has been a significant driving force in technology development as well as policy proliferation. Scientists and lawmakers have joined their efforts to protect identity and fiscal assets. However, through pillaging of cyberspace hackers as well as authorized utilization and think of sensitive information has ran rampant on every level. The attacks on military and financial districts of the United States on September 11 gave lawmakers either over the world, especi whollyy industrialized countries (i.e. Europe and the United States), a regenerate impetus to strengthen security on all levels. Biometrics and other related mechanisms have provided a means to aid in security.Biometrics is the development of statistical and mathematical methods application to data summary problems in the biological sciences. The form of measurement is used specifically penal and corporate identification systems to protect privileged and sensitive information. ... The Greeks used almost the same methodology but in cunning and tiny manner. Now, digital hand prints and eye identification are the standard as well as highest form of security to date to protect sensitive information and financial investments. (Tapscott, pg. 43) False positive tests are made to secure the identity of all constituents involved. Non-repudiationIn electronic commercial transactions such as the ATM, all constituents in a transaction must be assured their security is not infringed upon. Via authentication of all parties, a transaction could be made in full confidence. Systems are programmed to make prevent either concerned parties from repudiating a transaction prior to their agreement in a form of digital signatures. cryptographical chop up functionCryptographic hash function is used for information security cryptographic hash function is to translate and transcribe an original writing or picture into an algorithmic form or a digital fingerprint for data. The code that represents the actual artefact is conveyed in hash sums. Devices that utilize this method expeditiously dispense information without revealing information. Each hash function must have its avouch distinct algorithmic, code. Distinction is important inasmuch as it mitigates confusion between two people. Inasmuch as all constituents, to a transaction wish that transaction to be secure, electronic devices must authenticate all constituents to prevent either interlopers. Also, devices, such as ATM machines must prevent parties to electronically renege their transaction. To consolidate trust, the implement ation of digital signatures has been heavily utilized. (Cranor, pg 30)Polyalphabetic substitutionAmong the most original and often

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.