краткий пересказ. (Improving security) (Biometric Security technology) (краткий пересказ. (Improving security) (Biometric Security technology).docx)
Описание файла
Документ из архива "краткий пересказ. (Improving security) (Biometric Security technology).docx", который расположен в категории "". Всё это находится в предмете "английский язык" из 9 семестр (1 семестр магистратуры), которые можно найти в файловом архиве МГУ им. Ломоносова. Не смотря на прямую связь этого архива с МГУ им. Ломоносова, его также можно найти и в других разделах. .
Онлайн просмотр документа "краткий пересказ. (Improving security) (Biometric Security technology)"
Текст из документа "краткий пересказ. (Improving security) (Biometric Security technology)"
Improving security
-
How can management contribute to the development of the security policy?
They can take responsibility for management commitment, technological support for enforcing the policy, effective dissemination of the policy, and the security awareness of all users.
-
What are good security practices for the users?
Using strong passwords, one-time password system is preferable; regularly update software for patches and upgrades. Be accurate surfing the internet and use the antiviruses.
-
What are the advantages of a one-time password?
These passwords are never repeated and are valid only for a specific user during the short period. One-time password technologies significantly reduce unauthorized entry.
-
How can the authenticity of data be protected?
The authenticity of data can be protected using the encryption. Firstly, the sender encrypts the information and then attaches the encrypted digital signature. The recipient can decrypt the message and check if the digital signature correspond to the message.
-
What is a checksum for?
Checksum is a strong cryptographic technique, to ensure the integrity of the data.
Biometric Security technology
-
What is the goal of biometrics?
The biometrics has two goals: to verify or identify users.
-
Why is biometrics the most secure means of security?
Because it cannot be borrowed, stolen, or forgotten and forging one is practically impossible.
-
What are biometric technologies? Characterize them in brief.
Common physical biometrics include fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. The most developed technologies as signature and voice.
-
How can biometrics be used for secure network and computer access?
Biometrics can increase ability to protect sensitive data by implementing a more secure key than a password. Using biometrics, you can also create hierarchical security structure.
-
Why does storing a user's biometrics templates present a problem?
Because the template represents the user's personal characters, its storage introduces privacy concerns. Also storing the template in a centralized database paves for attack and compromise.