Preview

Advantages Of Biometric

Satisfactory Essays
Open Document
Open Document
348 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Advantages Of Biometric
It cant be easily guessed as in passwords
Don’t need to remember
The user does not require to carry device (mobile/ security token)

Concerns
Its expensive to install
The scanner is not always accurate
System may produce false negative- not allowing to login
Unlike passwords the biometric data cant be retracted – means- if someone knows your password, you can change them. If someone hacks your finger print, you cant change your finger.

User accounts and access level permission access level/ privilege are different for each user a few users may be able to read the data but cant edit the data

hacking
Gaining unauthorized access to a computer system
Ways to hack

Phishing- the fraudulent practice of sending emails purporting to be reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers online. Guarding against Phishing:
No company will ask for passwords… so do not reveal password to anyone either through emails, text or phone calls
Never click any links in your email to open, say, a bank website- it is better to type the bank URL
Black list the senders, if you know them, as spam
Be vigilant- don’t disclose your personal information on social networking sites

Looking over the shoulder

Packet sniffer

Social engineering- process of tricking or manipulating a person to reveal the password, for e.g. smishing- same as phishing but done to text messages, vishing- done through telephone calls, Pharming/ DNS poisoning- another type of attack that directs the users to the fake website when they enter the url of a genuine websites. This is possible by illegally accessible the DNS server and putting the IP address of their fake website

Key logger- spyware every keystroke that you type they can see the- virtual keyboard, shuffle and hovering on

password changes
Password cracker
Dictionary attack- using the dictionary terms as password
Brute force

You May Also Find These Documents Helpful

  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    Criminals often use social engineering along with vulnerabilities in applications such as web browsers or email clients to trick users into installing malicious code on their computer.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    network sniffing capabilities, was installed that captured the keystrokes of the user, thus obtaining user…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Deceptive Phishing Attacks

    • 1051 Words
    • 5 Pages

    “Phishing” is when cybercriminals try to get personal information like credit card numbers to steal money and passwords to important accounts. They can get this information from you and your computer. They can do it through emails, text messages, phone calls even. There are many techniques and styles attackers use to get this information out of people.…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In very basic terms, phishing involves a fraudster masquerading as a financial institution in order to steal a customer 's account information. More recently, criminals have been using increasingly sophisticated spy ware including Trojan horse, key logging and screen scrapper programs – which capture screen shots to obtain end user credentials (Reavley, 2005). No banking institution is immune to phishing. A financial want of desperate individuals is the driving force behind this threat also. They pray on almost all of the banking institutions regardless of their information security infrastructure. Banks now days take many anti-phishing measures to protect their customers. It is not so much of banking institution information security vulnerability but an internet browser security issue. Many browser now have an anti-phishing extension plug-in available for users to safely enter their important information…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The term phishing created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim. Started by cybercriminals, as it is easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer’s defenses. Phishing attacks are the most common security challenges that both individuals and companies face in keeping their information secure. The attacks can get access through passwords, emails, and credit card details (and sometimes, indirectly, money).…

    • 621 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Fingerprint Tech

    • 602 Words
    • 3 Pages

    Fingerprint technology is a part of biometric technology that is made to recognize special characteristics of an individual. Basically it involves an individual’s fingerprint, where those minute raised ridges on our volar pads are called ‘friction ridge skin’ is special from one person to another. For this reason fingerprints are able to be used as a form of personal identification as it is reliable and accurate. No one would have to remember passwords, PIN numbers or even carry keys or cards, which could avoid many kinds of unwanted problems.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    53. A technician has received several reports from employees about receiving e-mail from websites that request private bank information. Which type of security should be implemented to block employees from accessing these suspicious websites? 16.3.3 phishing protection…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Let us now examine the advantages and disadvantages of biometrics in two groups of applications: the commercial positive recognition applications that may work either in the verification or the identification modes, and the government and forensic negative recognition applications that require identification.…

    • 1031 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Phishing Attack

    • 4826 Words
    • 20 Pages

    In the field of computer security, Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes.…

    • 4826 Words
    • 20 Pages
    Powerful Essays
  • Best Essays

    authentication based on finger prints, hand geometry, iris and voice exist, such as forensics, driver license and passport control etc. Since…

    • 3825 Words
    • 16 Pages
    Best Essays
  • Satisfactory Essays

    MacSweeney, G. (2000). When "I love you" isn 't so sweet. Insurance & Technology, 25(7), 7.…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Social Engineering is an approach to manipulate people to perform an activity or to disclose information, primarily through misrepresentation, and often relies on human’s trusting nature. In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem legitimate, unassuming and respectable, possibly claiming to be an employee, repair person, or researcher and even offering credentials to support that identity.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Biometric technology is inherently focused on individuals and interfaces easily to database technology, making privacy violations easier and more damaging.…

    • 822 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Identity Theft

    • 413 Words
    • 2 Pages

    Phishing is were someone pretends to be a financial institution or a company and send spam or pop-up messages to get your personal information.…

    • 413 Words
    • 2 Pages
    Good Essays