issc 325 discussion response

punishment versus rehabilitation 3
March 14, 2023
philosophy essay 47
March 14, 2023

issc 325 discussion response

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

Please see the following activities for this discussion forum:

1) Discuss which biometrics method provides the best security while minimizing the potential of violating the user’s privacy rights.

Student one:

Hey Class,

As far as violating privacy rights goes, I believe it’s up to user/owner if they feel privacy rights are violated. In my opinion, the only violation would be from storing the biometric data. There should be some form of policy that fully explains the use of the biometric data, and depends on the user’s consent before it is stored (Ashbourn, 2014). Currently, the Department of Defense and other organizations are working on camera systems that can rapidly scan irises, and New York City has the Domain Awareness System which can be used to track individuals (Scientific American, 2014). Systems like these pose several privacy threats, mostly because of the non-consensual collection of biometric data and surveillance. Which brings me back to the storage of this information; if someone steals your identity, you may have to replace credit cards, change accounts, subscriptions, and more, but you can’t just get new biometrical features. You’d be out of luck trying to change who you are by replacing your fingerprints or iris patterns (Scientific American, 2014).

All methods include privacy risks as the data must be stored for the biometric system to work, so users should make sure to know exactly how the data will be used, consent to its’ usage/storage, and have the right to remove that consent at any time (Ashbourn, 2014). So, I would choose the method that is hardest to copy or imitate. Depending on the scope of the biometric system, I would choose the use of iris patterns, because finger prints can be copied, and voices can be recorded or imitated. If someone wanted to access your system badly enough, facial features could even be potentially copied.

References:

Ashbourn, J. (2014). ‘Assumptions and Misconceptions/Chapter 3’. Biometrics in the New World: The Cloud, Mobile Technology, and Pervasive Identity. Retrieved from https://library-books24x7-com.ezproxy2.apus.edu/assetviewer.aspx?bookid=77001&chunkid=578693335

Scientific American Editors. (2014, January 1). Biometric Security Poses Huge Privacy Risks. Retrieved from https://www.scientificamerican.com/article/biometric-security-poses-huge-privacy-risks/

-Rick

Student two:

The use of biometrics security has made verification and identification easier and faster. It can be more convenient and quicker to scan your finger or iris than having to input a password. Also, a password or pin requires you to remember it and with biometrics, the information you need is just stored on.

Biometrics provide great security because your characteristics are distinct to you. I think fingerprint and iris recognition, along with other methods, are all secure options when it comes to using these methods because they require a live source, someone cannot just duplicate these due to the need of temperature, electrical conductivity, and blood flow. However, I personally think that iris recognition is the most secure because it is least likely to be able to be duplicated. It is also assuring that the information is not stored through a picture but rather a mathematical algorithm.

When it comes to minimizing the potential of violating the user’s privacy rights, I think two things are important. The person’s knowledge that their information is being stored and where the data is stored. Covert surveillance can cause fear because people have no prior knowledge their information is being stored. Whereas with overt surveillance, you can educate the users about the biometric system and allow them to ask questions about what may concern them. When it comes to data storage, security measures must be put in place to ensure the data is safe. For portable storage, a smart card can ease the fear of users because they are in charge of their personal card and their information cannot be obtained without it. It is a hacker getting to the mathematical algorithms that are concerning. Although, as of now, there isn’t much they can do to replicate your data, it can cause concern for what they may be able to do with it in the future.

-Brittany

Das, Ravindra. Biometric Technology: Authentication, Biocryptography, and Cloud-Based Architecture. CRC Press, library-books24x7-com.ezproxy2.apus.edu/assetviewer.aspx?bookid=61757&chunkid=374288066&rowid=47¬eMenuToggle=0&leftMenuState=1.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.