Cybersecurity Planning

1. Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. 

Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

2. Some common biometric techniques include:

Fingerprint recognition

Signature dynamics

Iris scanning

Retina scanning

Voice prints

Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.

Tags: No tags