SlideShare a Scribd company logo
1 of 8
Exam Preparation Day
QUESTION 4 – SOCIAL ISSUES
Scenario
Usernames and passwords are in common use when performing personal functions on the
internet from accessing social media to banking. With reference to biometric security discuss
the reliability of current forms of access authentication. (8 Marks)
Usernames and passwords are in common use when performing personal functions on the
internet from accessing social media to banking. With reference to biometric security discuss
the reliability of current forms of access authentication. (8 Marks)
Usernames and passwords are in common use when performing personal functions on the
internet from accessing social media to banking. With reference to biometric security discuss
the reliability of current forms of access authentication. (8 Marks)
Identify = 1 mark
Discuss = 1 mark
Use in context = 1 mark
Sites such as Facebook use a verified email address to authenticate a user. Therefore, the site
would use your email address, that is unique to that mail server to create a unique profile on
Facebook. While this method does not stop people from having multiple accounts using
different email addresses, however it does help access to social media.
Facebook could use a series of biometric securities such as facial recognition to authenticate
users. This form of recognition would require the user to use a device with a camera or webcam
to enable an image to be taken and compared with the user account.
In the past these forms of biometric could be fooled with printed photos, however the
advancements made in the industry have seen Microsoft use Windows Hello and a 3D camera
to verify users. The success of the technology ensures that even identical twins can not fool the
system and gain access to the computer.
While the banking industry is moving ahead with payWave and ATM transactions from your
mobile phone, the industry has not adopted biometric security for every-day transactions. While
passwords and pin numbers can be shared with other people, it is much harder to share
biometric indicators with other people.
Biometric Identification
Questions?

More Related Content

What's hot

Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd Iaetsd
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSJournal For Research
 
Overtaking Firefox Profiles: Vulnerabilities in Firefox for Android
Overtaking Firefox Profiles: Vulnerabilities in Firefox for AndroidOvertaking Firefox Profiles: Vulnerabilities in Firefox for Android
Overtaking Firefox Profiles: Vulnerabilities in Firefox for AndroidIBM Security
 
Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Securitysherrymoon7121
 
Live Social Semantics @ ISWC2009
Live Social Semantics @ ISWC2009Live Social Semantics @ ISWC2009
Live Social Semantics @ ISWC2009Martin Szomszor
 
Custom contact facet
Custom contact facetCustom contact facet
Custom contact facetnisheesh
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...IJASRD Journal
 
Twitter Marketing Webinar
Twitter Marketing WebinarTwitter Marketing Webinar
Twitter Marketing WebinarKyle Lacy
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
Social Content Tool is here!
Social Content Tool is here!Social Content Tool is here!
Social Content Tool is here!Iva Kolevová
 

What's hot (11)

Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
 
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONSANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
ANDROID APPLICATION FOR PASSWORDLESS LOGIN FOR WEB APPLICATIONS
 
Overtaking Firefox Profiles: Vulnerabilities in Firefox for Android
Overtaking Firefox Profiles: Vulnerabilities in Firefox for AndroidOvertaking Firefox Profiles: Vulnerabilities in Firefox for Android
Overtaking Firefox Profiles: Vulnerabilities in Firefox for Android
 
Allneo
AllneoAllneo
Allneo
 
Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Security
 
Live Social Semantics @ ISWC2009
Live Social Semantics @ ISWC2009Live Social Semantics @ ISWC2009
Live Social Semantics @ ISWC2009
 
Custom contact facet
Custom contact facetCustom contact facet
Custom contact facet
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 
Twitter Marketing Webinar
Twitter Marketing WebinarTwitter Marketing Webinar
Twitter Marketing Webinar
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
Social Content Tool is here!
Social Content Tool is here!Social Content Tool is here!
Social Content Tool is here!
 

Viewers also liked

Question 5 - 2k15 Exam Preparation Day
Question 5 - 2k15 Exam Preparation DayQuestion 5 - 2k15 Exam Preparation Day
Question 5 - 2k15 Exam Preparation DayLeon Marsden
 
Question 6 - 2k15 Exam Preparation Day
Question 6 - 2k15 Exam Preparation DayQuestion 6 - 2k15 Exam Preparation Day
Question 6 - 2k15 Exam Preparation DayLeon Marsden
 
Question 1 - 2k15 Exam Preparation Day
Question 1 - 2k15 Exam Preparation DayQuestion 1 - 2k15 Exam Preparation Day
Question 1 - 2k15 Exam Preparation DayLeon Marsden
 
Question 8 - 2k15 Exam Preparation Day
Question 8 - 2k15 Exam Preparation DayQuestion 8 - 2k15 Exam Preparation Day
Question 8 - 2k15 Exam Preparation DayLeon Marsden
 
Question 7 - 2k15 Exam Preparation Day
Question 7 - 2k15 Exam Preparation DayQuestion 7 - 2k15 Exam Preparation Day
Question 7 - 2k15 Exam Preparation DayLeon Marsden
 
Question 9 - 2k15 Exam Preparation Day
Question 9 - 2k15 Exam Preparation DayQuestion 9 - 2k15 Exam Preparation Day
Question 9 - 2k15 Exam Preparation DayLeon Marsden
 
Question 3 - 2k15 Exam Preparation Day
Question 3 - 2k15 Exam Preparation DayQuestion 3 - 2k15 Exam Preparation Day
Question 3 - 2k15 Exam Preparation DayLeon Marsden
 
Question 2 - 2k15 Exam Preparation Day
Question 2 - 2k15 Exam Preparation DayQuestion 2 - 2k15 Exam Preparation Day
Question 2 - 2k15 Exam Preparation DayLeon Marsden
 

Viewers also liked (8)

Question 5 - 2k15 Exam Preparation Day
Question 5 - 2k15 Exam Preparation DayQuestion 5 - 2k15 Exam Preparation Day
Question 5 - 2k15 Exam Preparation Day
 
Question 6 - 2k15 Exam Preparation Day
Question 6 - 2k15 Exam Preparation DayQuestion 6 - 2k15 Exam Preparation Day
Question 6 - 2k15 Exam Preparation Day
 
Question 1 - 2k15 Exam Preparation Day
Question 1 - 2k15 Exam Preparation DayQuestion 1 - 2k15 Exam Preparation Day
Question 1 - 2k15 Exam Preparation Day
 
Question 8 - 2k15 Exam Preparation Day
Question 8 - 2k15 Exam Preparation DayQuestion 8 - 2k15 Exam Preparation Day
Question 8 - 2k15 Exam Preparation Day
 
Question 7 - 2k15 Exam Preparation Day
Question 7 - 2k15 Exam Preparation DayQuestion 7 - 2k15 Exam Preparation Day
Question 7 - 2k15 Exam Preparation Day
 
Question 9 - 2k15 Exam Preparation Day
Question 9 - 2k15 Exam Preparation DayQuestion 9 - 2k15 Exam Preparation Day
Question 9 - 2k15 Exam Preparation Day
 
Question 3 - 2k15 Exam Preparation Day
Question 3 - 2k15 Exam Preparation DayQuestion 3 - 2k15 Exam Preparation Day
Question 3 - 2k15 Exam Preparation Day
 
Question 2 - 2k15 Exam Preparation Day
Question 2 - 2k15 Exam Preparation DayQuestion 2 - 2k15 Exam Preparation Day
Question 2 - 2k15 Exam Preparation Day
 

Similar to Question 4 - 2k15 Exam Preparation Day

02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of BiometricsHector Hoyos
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101Gigya
 
Windows identityfoundationwhitepaperfordevelopers rtw
Windows identityfoundationwhitepaperfordevelopers rtwWindows identityfoundationwhitepaperfordevelopers rtw
Windows identityfoundationwhitepaperfordevelopers rtwPradeep Krishnamurthy
 
Literature survey on identity management
Literature survey on identity managementLiterature survey on identity management
Literature survey on identity managementVaibhav Sathe
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008eComm2008
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor AuthenticationPing Identity
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineHector Hoyos
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking SitesAshley Surabhi
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
 
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...ijcsit
 
Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...AIRCC Publishing Corporation
 

Similar to Question 4 - 2k15 Exam Preparation Day (20)

02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics02-05-15 - Evolution of Biometrics
02-05-15 - Evolution of Biometrics
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
White Paper: Social Login 101
White Paper: Social Login 101White Paper: Social Login 101
White Paper: Social Login 101
 
Windows identityfoundationwhitepaperfordevelopers rtw
Windows identityfoundationwhitepaperfordevelopers rtwWindows identityfoundationwhitepaperfordevelopers rtw
Windows identityfoundationwhitepaperfordevelopers rtw
 
Literature survey on identity management
Literature survey on identity managementLiterature survey on identity management
Literature survey on identity management
 
Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008Tony Nadalin' presentation at eComm 2008
Tony Nadalin' presentation at eComm 2008
 
Biometrics
BiometricsBiometrics
Biometrics
 
OlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_FinalOlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_Final
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
March 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech BylineMarch 2014 - Biometric Technology Today - Token-less Tech Byline
March 2014 - Biometric Technology Today - Token-less Tech Byline
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
June Documentation
June DocumentationJune Documentation
June Documentation
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
AUTHENTICATION AND VERIFICATION OF SOCIAL NETWORKING ACCOUNTS USING BLOCKCHAI...
 
Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...Authentication and Verification of Social Networking Accounts Using Blockchai...
Authentication and Verification of Social Networking Accounts Using Blockchai...
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Question 4 - 2k15 Exam Preparation Day

  • 1. Exam Preparation Day QUESTION 4 – SOCIAL ISSUES
  • 2. Scenario Usernames and passwords are in common use when performing personal functions on the internet from accessing social media to banking. With reference to biometric security discuss the reliability of current forms of access authentication. (8 Marks)
  • 3. Usernames and passwords are in common use when performing personal functions on the internet from accessing social media to banking. With reference to biometric security discuss the reliability of current forms of access authentication. (8 Marks)
  • 4. Usernames and passwords are in common use when performing personal functions on the internet from accessing social media to banking. With reference to biometric security discuss the reliability of current forms of access authentication. (8 Marks) Identify = 1 mark Discuss = 1 mark Use in context = 1 mark
  • 5. Sites such as Facebook use a verified email address to authenticate a user. Therefore, the site would use your email address, that is unique to that mail server to create a unique profile on Facebook. While this method does not stop people from having multiple accounts using different email addresses, however it does help access to social media. Facebook could use a series of biometric securities such as facial recognition to authenticate users. This form of recognition would require the user to use a device with a camera or webcam to enable an image to be taken and compared with the user account. In the past these forms of biometric could be fooled with printed photos, however the advancements made in the industry have seen Microsoft use Windows Hello and a 3D camera to verify users. The success of the technology ensures that even identical twins can not fool the system and gain access to the computer.
  • 6. While the banking industry is moving ahead with payWave and ATM transactions from your mobile phone, the industry has not adopted biometric security for every-day transactions. While passwords and pin numbers can be shared with other people, it is much harder to share biometric indicators with other people.