Posts

Showing posts from November, 2024

Biometric Authentication Methods

Image
 There are many forms of biometric authentication, each with merits and demerits. The fingerprint identification is quite accurate and had been easy to be chosen since the majority is already familiar with it. However, it's subject to certain factors such as physical issues of cuts, or even dry skin that could affect fingerprint matching besides being vulnerable to spoofing attempts. The other famous approach is face recognition, which provides a passive authentication easily usable interface. In any case, it gives probably less accurate results under changing the lighting conditions or under different expressions of the face and raises some problems regarding the privacy of a person. Iris and retinal scanning are usually very good techniques in application areas where extremely high accuracy is required. Iris and retina patterns are unique and stable, hence the methods are highly resistant to spoofing. About which, while it is true that only the equipment is highly valued and a fe...

PHYSICAL SECURITY

Physical security is crucial to organizations, and the implementation safeguards businesses from potential threats. Here are some ways physical security threats are faced by organizations. Burglary or theft  Vandalism Unauthorised access Human negligence Sabotage tailgating Cyber attack   Here are some ways organizations can secure themselves from these threats: Site security locks can be particularly important and must be implemented in any business security protocol. Buildings can be locked to prevent access; this is important to a business that has a server room where gaining entry can be detrimental; gaining access might lead to damage by malicious actors. This method ties in closely with site security locks; the use of swiping a card or smart card, facial recognition, and fingerprints could be another alternative. It helps to track and identify individuals entering rooms and buildings and enables detection of suspicious activities. This will enable investigations i...

DATA LEAK

  Data breaches posses huge risks to organisations and they are required to report incident within 72hours of discovery. The breach needs to be contained as soon the organisation realises a data breach has occurred and identify how the incident occurred so that further damage could be mitigated.in some instances, individuals whose data is breached will need to notified about the situation. Individuals will be advised to change their passwords and be aware of any unusual activity on tier account. Lastly the supervisory authority will be alerted about the incident which they will then investigate the organisation which was breached to find out whether the breach could have prevented. In 2015 TalkTalk had a significant data breach led to a major change in data protection policies to make sure they comply with the Data Protection Act 2018, which saw the UK implanting the GDPR.   Whitelisting vs Blacklisting Whitelisting ensures that only trusted entities will be able to ac...