Biometric Security

Improved Essays
Nowadays, not many people can walk down the street without running into someone connected to cyberspace. The Internet of Things is a broad term used to define an entire system of devices connected to cyberspace that can communicate with one another. As shown in figure 1.1, there are many devices just at home that can be considered a part of the IoT. This figure is just a small example of all devices that are connected to cyberspace. The term IoT can cover phones, watches, laptops and just about anything mobile that connects to cyberspace. With the IoT constantly expanding due to new internet ready devices introduced, new security measures must be taken to protect these devices. Every new device introduced into the IoT is a potential entry …show more content…
One solution to secure these devices physically is the use of biometrics. Biometric security is the use of a biological data to secure the phone, this includes fingerprint, iris or face scanners. As previously stated, the use of four number pins are ineffective because if given enough time or preparation, any hacker can bypass this. This problem is similar for most passwords within any online service, which is why most phones offer to save passwords when accessing certain applications. The main problem with a password is that it must be long and difficult to guess for it to be effective. But this causes users to use the same password across different services, or just use simple passwords that are easy to remember (Albahdal and Boult 294). Biometric data offers a substantial increase in security over the traditional password system since there is no forgetting your biometrics and there is no guessing your biometrics. Many companies, such as Apple, Google and Samsung, are adopting biometrics as a form of security for mobile phones. Biometrics on a small scale, like just on a mobile phone, is effective. But, there are some shortcomings when it comes to biometric security in the …show more content…
For XSS attacks, prevention is consumer safety. Questionable links, emails, messages and websites should always be avoided and antivirus programs should always be up to date. An SQLi attack is different, this form of attack must be dealt with by the individual operating the website. One suggestion that looks promising is System Query Injection Prevention by Input Labeling(SQLiPIL). An SQLiPIL is a tool that is automated and effective in preventing SQLi attacks (Masri and Sleiman 2545). This tool takes a website coded in java with SQL strings and converts those strings into prepared statements dynamically, ensuring that they are using prepared statements rather than allowing user input to act directly with the code. A prepared statement is a string of code that is already produced within the program. It is already suggested that coders using java should use prepared statements, but it is not a widespread practice (Masri and Sleiman 2556). This code helps alleviate that problem by dynamically manipulating a website code to ensure it’s more

Related Documents

  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    Nova Southeastern University Graduate School of Computer and Information Science Department of Management Information Systems MMIS 656 - Web Design Technologies Assignment # 1 Mohammed Aljaafari Exercise 1.1 Latest Versions Sources Browser Opera 27.0.1689.66 http://filehippo.com/ Web server Google Chrome 42.0.2292.0 Dev http://filehippo.com/ JavaScript JavaScript FH Plus http://en.softonic.com/ PHP PHP 5.6.5 http://php.net/downloads.php Servlets Java Servlet 3.0 http://www.oracle.com/ ASP.NET ASP.NET 5 http://www.asp.net/vnext…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Great Essays

    As the number of IoT devices in the future increases there will be an overwhelming amount of data that needs to be processed, analyzed and transferred back to the end device. For this a robust architecture is needed that is capable of processing high amount of data in real time in a very fast and orderly process. The storage of such huge data also must be taken into consideration. This is because there should be a centralized data management system.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Technology has changed a lot over the years, but has it changed for the better? Many people think it has not. All over the world, people are on their cellular devices. Little do they know that the government can see everything they do and search on their phone. Therefore, I propose a 28th Amendment to the United States Constitution stating that Technology privacy will now be issued among everyone and the government will no longer have access to anyone's history.…

    • 433 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Essay On Gun Safes

    • 501 Words
    • 3 Pages

    This might be let's say a burglar entering your property in the nighttime. Using a key, you would need to discover the key initially, and then fit it in the lock and pry it open. Typing in a combination during the night in darkness can be rather hard. Sure a keypad with a light takes care of the sight issues, but in case you are in a panic, it may be pretty difficult to recollect the precise number sequence. Swiping your biometric over the reader is everything that you need to do with a biometric handgun safe.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Good afternoon Gentleman, Just to remind you the next event for the biometrics screening will be in Fort Lauderdale August 28th from 5:00 am to 9:00 am at the Florida Blue center (please see attached for more info), remember the employee have to sign up as well as their dependents (if any), they do not have to show up at a specific time, the list is only for scheduling purpose with Florida Blue, but I need to know the name of the employee that will attend.…

    • 86 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    • Universality: If a person cannot present a trait to the multimodal biometric system due to disease or disability, the system can use other biometric traits for the recognition task, so we can say that the multimodal biometric system is universal in nature. • Reliable recognition: the multimodal biometric systems integrate multiple biometric modalities and each single trait can offer additional evidence for the recognition task. For example, the voice of two individuals can be similar. So, the unimodal voice recognition system might lead to a false recognition. However, if we add for the same biometric system other modality such as iris or fingerprints, the recognition rate of the system would be certainly increased, because it is nearly impossible…

    • 136 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Sign language does come into play with this specific form of biometric identification, however a user does not need to know sign language to create a password. This biometric authentication is flexible enough to allow a user to create a random motion, or gesture and assign it a meaning known only to the user (Fong, Zhuang, Fister, Fister Jr, 2013). This can also be used a two-step verification method as the user could be prompted to enter the word or phrase previous assigned to their custom gesture (Fong, Zhuang, Fister, Fister Jr, 2013). Using hand gestures as a form of biometric authentication has many advantages over other forms of biometric authentication, one being that the password can be easily changed at any time, unlike the fingerprint scanner. Another massive advantage that this form of biometric authentication has is the cost that it takes to implement and use hand gesture authentication.…

    • 1306 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The author emphasizes the need for companies to broaden their risk management approach to withstand negative outcomes of cyberspace. In addition to, the author depicts five important trends that must be understood in order to combat security threats: 1.The unintended consequences of state intervention 2. Big data will lead to big problems 3. Mobile applications and IoT 4. Cybercrime causes the perfect threat storm 5.…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Likely implications: Amnesty international have certain likely implications that can occur via the use of this IoT framework. The major issue is security, with the amount of internet-connected devices are lacking in rudimentary cyber security procedures that it's likely to hack them in as little as three minutes, allowing cyber attackers to steal data (Palmer, 2016). This is a huge issue for any company as well as Amnesty International. This is because they carry so much data form their donors which contain personal information including credit card details as well as home addresses. This personal information needs to be protected so that a cyber attacker cannot hack them and get a hold of this information.…

    • 217 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In "The Ethics of Biometrics: The Risk of Social Exclusion from the Widespread Use of Electronic Identification," Jeremy Wickins discusses concerns when making biometrics identification a universal practice. Wickins alerts that using computer biometrics will cause an unethical segregation of people in society, due to the computer being unable to scan the disable, elderly, or personal religious customs. When defining biotechnology, Wickins explains, when people think of biotechnology, what comes to mind for many is automotive manufacturers, DNA testing, cloning, and reproductive technology. The field of biometrics is equally a branch of biotechnology whose development over the years has been ever evolving through computer technology and warns us the ethics of its use and should be scrutinized closely.…

    • 747 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1. Where did the idea for your grant program come from? I understand that getting a business idea off the ground is difficult for young students or entrepreneurs. Some young minds have amazing ideas, but the state of the economy would not allow them to save enough money to get started. Even the $500 that I give to some grantees have went a long way.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Apple Pest Analysis Essay

    • 706 Words
    • 3 Pages

    Analysis of the marketing environment for smart phones includes identifying opportunities in the market place which requires a solid understanding of the company’s industry. When the right combination of circumstances and timing permits an organization to take action to reach a particular market, a market opportunity exits. Smart phones have a vast market as it has become an essential part of our daily lives. It is defined as a device that functions as a computer like having the ability to access the internet and use apps [1].…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Pros Of An Automated Future In Driving As if we are finally seeing the vision out parents and grandparents had of the “World Of Tomorrow” self-driving, “smart” cars are finally preparing to exit their concept stage and creep into the world of consumer availability. While the jury is still out on how well-regulated smart cars will need to be, the eagerness to own one among industry buffs and your every-day consumer is growing with each new statistic, report and feature touted by manufacturers. While one could spend nearly a week going over each of the intricate details and features vendors wish to promote, a primer on the overall positive experience of a smart car-ubiquitous world is something that needs to be considered.…

    • 759 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    They amuse data gathers by cookies and different innovations, such as insensitive information (Apple, 2014). Besides, Apple 's map services, give the precision into its GPS administrations (Staff, 2015). IOS gadgets gives new security viewpoints, but they have easy to utilize. Numerous angles are empowered naturally, along these lines IT divisions don 't require to execute wide designs. Most security aspects as gadget encryption are not configurable, subsequently clients can 't…

    • 905 Words
    • 4 Pages
    Improved Essays