Detailed report on Cyber Security.

Requirement

Detailed report on  cyber  security. 

Solution

REFLECTION OF THE PRACTICE

In the previous assignment, I discussed about the ‘finger print scan’ biometric technique that I use to safeguard my device against the cyber and user threats and vulnerabilities. This method has a lot of advantages over the other methods available for security. For example, passwords can be easily stolen. 
Or even one may forget the password or someone may replicate it. But in case of biometric, it is easy to make the device secure, no memorization or replication because it is what you are, not what you know. But with all these advantages, there are certain disadvantages as well. There are certain problems associated to its use like, prone to hacking. 

The experts of Allassignmenthelp.com have expertise and experience in coursework writing help. Our team has professionals with relevant industry experience who can provide you with the best information technology assignment help. So without wasting any of your time place your order and get the best quality IT management assignment help.

Yes, the biometric data stored on the devices can be hacked and the devices can be easily unlocked. In the present we see that for every security measure a counter hack is developed. So same is with the biometric data. The devices nowadays are factory reset using tools. This process erases all the security data like passwords etc. from the device and it is as good as new. 
Even if we add tracking systems, they can still be stolen and reused without getting caught. The other threat is that the lock may stop working. This will then lock the device hence making it more inconvenient way rather than a convenient one. The next threat is spoofing. Anyone can pick up your finger prints from objects and spoof them and unlock your data. For example, your device will have your finger prints all over which is a great alternative for spoofing the data. 

DIFFERENT PRACTICES AND THE BEST OPTION

Apart from the biometric locks there are other options which can be used for creating security protocols for the devices. As discussed in the proposal, these are:

  1. Use of Access Controls
    Use of access control on my device apart from use of biometrics finger print scan, is another security area. We may use passwords, retina scans, encrypted passwords etc. as we discussed that securing personal data, social media passwords and account information, etc. There are certain tools developed and installed on devices for this purpose. These tools implement access control on individual applications or overall locking of the system. These ensure that the application and the data within them is secure and not misused intentionally or unintentionally. Although there may be a chance of spoofing or hacking in this process as well, yet it is a good option to rely on.

  2. Detailed Log creation
    Another option we discussed is Logging. It can also help in guarding against the cyber threats. This can be done by installing the tools that create logs of the activities done on the device be it local activity or at the backend or on the internet. 
    So whenever you are not near the device, you can yet know what happened on it. It can maintain the cyber security by recording the local as well as the internet activity. It can also act as an intrusion detection system. So now wherever an illegal access occurs, you can always trace it. This way we will be able to maintain the security. 

  3. Use of firewalls
    Next we discussed was the use firewalls to guard our private network against threats and vulnerabilities. There are various types of firewalls like packet filtering and message filtering firewalls which help in scanning and filtering the messages which in turn can guard against social engineering or phishing. The implementation can be carried out by use of anti-virus software as well by enabling the firewall feature. 

From all of these options I would use the process of creation of logs because I’m already using the method of biometric locks to protect my device. So, log tracking will create a double security on my device. Hence I will always know what all occurred on my computer when I used it and when I didn’t. Logging and biometrics together can form a strong support to safe guard even against the cyber threats. For example there may occur situation, when someone tries to force open the system by spoofing my finger print, I can always get to know it via the logs, and hence can change the finger print, which is not possible to detect if we do not have logs. So a security protocol in support of the other is the best option to opt and adapt. 

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Place Your Order

REFERENCES

  • Williams, C., 2016. Biometric Authentication: An Added Layer of Security or Security Risk?. [Online] 

  • Available at: https://blog.digicert.com/biometric-authentication-methods/

  • [Accessed 27 October 2016].

  • Zanderigo, M., 2016. 10 Best Practices for Cyber Security in 2016. [Online] 

  • Available at: http://www.observeit.com/blog/10-best-practices-cyber-security-2016

  • [Accessed 26 October 2016].

Get Quality Assignment Without Paying Upfront

Hire World's #1 Assignment Help Company

Place Your Order