Monday, June 10, 2019

Biometric identification Essay Example | Topics and Well Written Essays - 2000 words

Biometric identification - Essay Example36). With the contemporary popularity as well as prospective profits of conducting transactions electronically, m each organization executives bring a conflict situation. In other words, online connections to expand their sales are likely to lead to threats and risks of intrusion. Alternatively, staying disconnected from this very earnings will bind them to forfeiture their client contact as well as services to their existing competitors.In order to transact most business dealings, and to convey electronic mail, the lucre makes use of mail transfer protocol (Jain et al. 92). These transmissions possess as much confidentiality as a postcard. In other words, it travels over untrusted and insecure lines. This implies that anybody who is at any point along the path of transmission stop access the message and hence read its content using the word processing program or text viewer. Also, since these transmission lines are not secure, forging e-m ail or using the name of another person is easy. This has made theft of identity matchless of the leading fraud incidences. An individual can claim that another person sent a message, for instance, to terminate an order or evade paying an invoice. twain in the private and in the public sectors, organizations are cognizant of the needs and importance of internet security (Jain et al. 93). Both sectors, therefore, have led to measures that safeguard their internet data and business systems. However, the most appropriate way to prevent an intruder from accessing the network is by providing a security wall in between the incarnate network and the intruder. Since these intruders accesses the system by the use of a software program, like a virus, or through a direct connection, user authentication, data encryption, and firewalls can somewhat prevent these intruders who intend to hack such networks.The first step to beefing up

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.