THIS TASK IS A PARTIAL REQUIREMENT IN IT6

SECURITY TECHNOLOGIES - ENCRYPTION






Image Credit/Google

ADVANTAGES OF ENCRYPTION:


* encryption is automatic so there is less opportunity for human error.


* if someone doesn't know what you're sending them it remains private.


* it keeps others from being able to easily read your private information that has been encrypted.


* if the communications link operates continuously and carries an unvarying level of traffic, link encryption defeats traffic analysis.


DISADVANTAGES OF ENCRYPTION:


* it slows your computer down and uses up resources such as memory, hard drive space etc.


* there is a lot of overhead in terms of processing, that which requires encrypting takes processing to convert what would be readable information to the unintelligible and then again at the other end to convert the unintelligible back to the readable while in transport or storage.











SECURITY TECHNOLOGIES - ACCESS CONTROL SOFTWARE






image credit/Google


PROBLEMS OF ACCESS CONTROL SOFTWARE:


Data leakage as a result of internal threats can be minimized with good access governance, according to experts and IT professionals. But many senior executives are failing to heed the advice, according to a recent survey.


ADVANTAGES OF ACCESS CONTROL SOFTWARE:


* One advantage is that it encapsulates all the access an entity needs in one set, the "role". This makes establishing or removing access for an entity much easier as the particular access needs are easily known.


DISADVANTAGES OF ACCESS CONTROL SOFTWARE:


* A disadvantage is that it does not provide flexibility. A certain entity is bound to the access provided by the role they are in. More often than not there are exceptions in the access needs of an entity. It would be rare that very large groups of entities would all need the exact same access. 

SECURITY TECHNOLOGIES - FIREWALL







                 video credit/Google


THE PROBLEMS OF FIREWALL:


Firewalls introduce problems of their own. Information security involves constraints, and users don't like this. It reminds them that Bad Things can and do happen. Firewalls restrict access to certain services. The vendors of information Technology are constantly telling us "anything, anywhere,anytime", and we believe them naively. Of course they forget to tell us we need to log in and out, to memorize our 27 different passwords, not to write them down on a sticky note on our computer screen and so on.


Firewalls can also constitute a traffic bottleneck. They concentrate security in one spot, aggravating the single point of failure phenomenon. The alternatives however are their no Internet access, or no security, neither of which are acceptable in most organization.


ADVANTAGES OF FIREWALL:


* they provide more complete protection than software firewalls.


*it can protect an entire network computers


*it don't effect system performance


*operate independently of your operating system and software applications.


DISADVANTAGES OF FIREWALL:


*they tend to be more expensive than software firewalls, although if you have several machines to protect it can cost less to purchase one hardware firewall than a number of copies of a software firewall.


*they can be a bit challenging to configure.

SECURITY TECHNOLOGIES - BIOMETRIC

video credit/Google

The problems of BIOMETRIC

Certainly a fingerprint or iris scan can identify an individual. Unfortunately, the means for acquiring biometric records are neither convenient nor inexpensive. Even then, biometrical records will not result in a completely secure system. Obtaining a copy of an individual's biometrics can be trivial. I have seen two movies where a waitress lifted a fingerprint from a glass in a restaurant for nefarious uses. There are also devices that can capture iris images of a person walking within a few feet of a video camera (often behind a one-way mirror) so that it can be duplicated and used for illegitimate purposes. The real problem with biometrics is that once an individual's biometrics has been compromised, they are compromised for life and can never be trusted again. However, my most severe objection to biometrics as an authentication method is their reliance on a central database that contains the identifying graphic templates. If such database is compromised, then the biometrics of ALL users in the database are compromised for life.

Voice recognition must be also considered as a potential authentication biometric. Unfortunately, the technology is as yet not sufficiently reliable, is expensive and difficult to implement. It also suffers from all of the disadvantages of having to rely on a central database for storing voiceprint templates.

Advantages of Biometrics : 

*  Increase security - Provide a convenient and low-cost additional tier of security.

* Reduce fraud by employing hard-to-forge technologies and materials. For e.g. Minimize the opportunity for ID fraud, buddy punching. 

* Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorized use of lost, stolen or "borrowed" ID cards. 

*  Reduce password administration costs. 

*  Replace hard-to-remember passwords which may be shared or observed. 

*  Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and     scalable control solution for facility and network access 

*  Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! 

*  Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance. 

*  Unequivocally link an individual to a transaction or event.


Disadvantages of a Biometric:


·       *  The finger print of those people working in Chemical industries

    are often affected.Therefore these companies should not use the       

    finger print mode of authentication.

·     
                 *  It is found that with age, the voice of a person differs. Also

    when the person has flu or throat infection the voice changes or

  there are too 
much noise in the environment this method
 maynot 




  authenticate 
correctly. Therefore this method of 
verification 



  is 
not workable all the
 time



* For people affected with diabetes, the eyes get affected

  resulting in  differences.

     


·        *  Biometrics is an expensive security solution.

Trick Dice Hack!!!!

                                                   Video Credit Trick Dice Hack/Youtube

LAW,ETHICS,COMPUTER TECHNOLOGY

...... Law....... 
 Is a system of rules and guidelines, usually enforced through a set of institutions.




........Ethics........
 Also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, concepts such as good and evil, right and wrong, virtue and vice, justice, etc.





......Computer Technology......
 It is used in programming, and designing. Computer Technology was used in schools, offices, banks, schools and many others.