Preview

16 Mobile Devices and Social Networking Security Solution

Better Essays
Open Document
Open Document
2535 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
16 Mobile Devices and Social Networking Security Solution
Aman Jain and Shilpa Mehta

85

Mobile Devices and Social Networking Security Solution
Aman Jain and Shilpa Mehta
Abstract: Nowadays almost everyone is using smart phones. They are becoming an essential tool in human being’s everyday life. They are not only used for mere communication such as calling or sending text messages; however, they are also used in applications such as for accessing internet, receiving and sending emails and storing documents. As a result of this, not only phone numbers and addresses are stored in the mobile device but also financial information and business details which definitely should be kept private. And if the device is being stolen, each and every information is in the hands of the new owner. That’s why; the biggest challenge is the security. When it is necessary to confirm the user identity on systems to perform a given operation, the term User Authentication is used. Traditionally, people prove their identity by providing passwords. The average person today has about 25 password protected accounts (according to Microsoft study), more passwords than they can reasonably be expected to remember. People compensate by using the same password for multiple accounts, and by choosing passwords that are easy to remember. But, unfortunately easy to remember means easy to guess. Other user select difficult passwords but then write them down where unauthorized eyes can find them. That’s why, identity based on what you know (login and password) and what you have (ID cards) can be easily stolen. As we want trust (security), the notion what you are is a new opportunity to user authentication. Biometric Authentication is answer for that. Biometric is a characteristic of human being that distinguishes one person from another. For example, finger prints, retina, face recognition, etc. This can be used for identification or verification of identity. Keywords: FAR, FRR, ROC, EER, FTE, FTC. B.

2.
A.

BIOMETRICAUTHENTICATION IN SOCIAL

You May Also Find These Documents Helpful

  • Best Essays

    There are thousands of applications that have been developed for mobile devices which perform a myriad of tasks and processes. In the beginning most of these applications were games. Businesses later joined the mobile revolution and developed their own business based applications to run on these mobile devices. Many mobile business applications can now streamline business processes, reduce operational processing times and provide better customer service. The mobile revolution has forced many industries to reengineer their business processes…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The students will research best practices for private sector and public sector authentication as it relates to e-commerce and on-line banking. Then they will research the best practices for remote access for employees through public Internet and for employees of city, county, state, and federal governments, based on DoD standards for secure remote access. Multi-factor authentication and restrictions based on data types and sensitivity as discussed in previous labs are major considerations for this research when investigating RADIUS, TACACs+ and WLAN authentication methodologies.…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    One of the most reasons for people not using mobile banking is the security concern. So how to improve security on people’s mobile devices has become a very important thing. They can make an external device for their mobile banking. The external device can insert into the headphone jack on smartphone. After the connection, customer should slide their card, and then system will be prompted to enter some personal authentication information, and then will send a message for their smartphone to get the verification code before use the mobile banking to do their account activities. Customer can get this external device for free if…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Tiny, portable gadgets, such as pocket digital assistants (PDAs) and mobile phones have been in the recent years pushed on the mark. Mobile or ubiquitous computing and handy gadgets are changing the relations between computers and humans.there is an introduction of a new communication approach based on context. This approach enables people to interact with computers, objects and environments seamlessly. Mobile computing devices have enabled composite cooperation and communication patterns that were not dreamt of in the past years. They possess vital features in portability, ability to share information using communication networks; wireless, and synchronizing the information with other standardized gadgets. There have drastic changes in the technological landscape in the past years led by the emergence of mobile computing devices focusing on consumer preferences.…

    • 1381 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Biometric Marketing

    • 409 Words
    • 2 Pages

    With the growing concern of online theft and security leaks, Biometric systems could be just the concept to fill the uncertainty knowledge gap. Online companies have been for long trying to narrow this uncertainty gap for online consumers by applying several tracking methods during web site visits, including the use of smart cards, tokens, credit cards and digital certificates, to provide the means to correlate a consumer with an online system. But all suffer from uncertainties and lack of reliability in achieving accurate identification. For example, because a biometric sensor will never capture the exact same data twice, the matching of biometric features requires additional fuzzy logic comparison. This requirement will help in acquiring accurate data on market research. The companies with the help of this data will be in a better position to align its IT and…

    • 409 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.…

    • 3481 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Biometric is a tool used to identify and reliably confirm an individual’s identity on the basis of physiological or behavioral characteristic (combination of both) which are unique for a specific human being. Biometric technology has been around for so many years and the technology has being used as the latest weapon to fight against crime. The scope of this paper is reflecting on biometric in terms of ethical and privacy issues. There are a number of ethical issues centering on biometric concerning privacy rights of individuals. Examples of biometric technology are fingerprints, facial recognition, DNA, palm print recognition, hand geometry, iris recognition, odor recognition and etc. These devices are being used more and more around the world each day. Some examples are: places like airports, Walt Disney, office buildings, banks, military, government facilities and the list goes on and on as we rely on this technology to help identify us for our security. This technology has been used in many ways to protect our personal identity. In fact biometric is tightly linked to an individual and it is difficult to duplicate a biometric trait, it can prevent identity theft and rule out the use of several identities by a single individual, however one concern is about the stored biometric data.…

    • 1023 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Identity Theft

    • 1418 Words
    • 6 Pages

    “People must be vigilant in protecting their identities” this is the argument that the police department uses to be able to get personal information of people from their cellphones. Unfortunately, as long as identity theft is a profitable venture, it will not disappear. The only way consumers and businesses can deal with it is to learn how to prevent it and then take those preventative measures. The most important action anyone can take to prevent against identity theft is to be aware of how personal or financial information is disseminated and the ways in which such information is vulnerable to misuse.…

    • 1418 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    A biometric device is one that verifies personal characteristics to authenticate a user. Examples of personal characteristics are fingerprints, voice pattern, signature, hand size, and retinal (eye) patterns. “A biometric device usually translates a user’s personal characteristics into a digital code that is compared to a digital code stored in the computer” (Victors, 7). If the digital code in the computer does not match the user’s code, access is denied. Each of these authentication techniques has advantages and disadvantages.…

    • 414 Words
    • 2 Pages
    Good Essays