Sunday, September 8, 2019
Biometric identification Essay Example | Topics and Well Written Essays - 2000 words
Biometric identification - Essay Example 36). With the contemporary popularity as well as prospective profits of conducting transactions electronically, many organization executives experience a conflict situation. In other words, online connections to expand their sales are likely to lead to threats and risks of intrusion. Alternatively, staying disconnected from this very internet will bind them to sacrifice their client contact as well as services to their existing competitors. In order to transact most business dealings, and to convey electronic mail, the internet makes use of mail transfer protocol (Jain et al. 92). These transmissions possess as much confidentiality as a postcard. In other words, it travels over untrusted and insecure lines. This implies that anybody who is at any point along the path of transmission can access the message and hence read its content using the word processing program or text viewer. Also, since these transmission lines are not secure, forging e-mail or using the name of another person is easy. This has made theft of identity one of the leading fraud incidences. An individual can claim that another person sent a message, for instance, to terminate an order or evade paying an invoice. Both in the private and in the public sectors, organizations are cognizant of the needs and importance of internet security (Jain et al. 93). Both sectors, therefore, have led to measures that safeguard their internet data and business systems. However, the most appropriate way to prevent an intruder from accessing the network is by providing a security wall in between the corporate network and the intruder. Since these intruders accesses the system by the use of a software program, like a virus, or through a direct connection, user authentication, data encryption, and firewalls can somewhat prevent these intruders who intend to hack such networks. The first step to beefing up
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.