Please follow the exact instructions within the attached. Note that 3 of the questions require at least a 2-page response and 1 question requires at least
... [Show More] a 1-page response. This does not include references and citations and title page.
Short Papers
1. Biometric Identification and Privacy Implications
In at least two pages, explain how biometric identification is achieved. What are some of
the characteristics of biometric identification? What are some of the advantages for using
biometric identification? What are some of the privacy concerns in employing biometric
identification techniques?
Biometrics is a security measure employed to uniquely identify individuals based on their
biological or physiological characteristics. Biometrics is used as an additional means to provide
authentication or can be used as the primary means of authentication. Some of the common
recognition traits used in biometrics include fingerprints and people’s eye. The use of personal
traits by biometric identification system can pose privacy concerns.
2. Identifying Security Threats
In at least two pages, identify one security risk that could arise when someone has their
laptop stolen. You will need to identify the specific threat, briefly describe it and explain
how it is applicable in the context of a laptop being stolen.
While it is important to understand the fundamental concepts of information security and
protection mechanism. It is also equally important to examine the different kinds of threats and
attacks that compromise computer security. This will enable you to respond effectively and work
to prevent the common types of security attacks. Identify one security risk that could arise when
someone has their laptop stolen. You will need to identify the specific threat, briefly describe it
and explain how it is applicable in the context of a laptop being stolen. Please note that the
threats to information assets are not limited to the ones you read about in your module reading.
You can also use the Internet to research for other threats.
3. Comparing Wireless Security Technologies
In at least one page, summarize the main differences and similarities between WEP
(Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Is one considered more
secure than the other? Why or why not? Please explain.
Wireless networking has gained unprecedented importance with the rise of mobile and wireless
communication technologies among the Internet population. Wireless networking presents a
number of additional challenges to security. In a wireless network, information is transmitted
through open space with no physical barriers, making it easier to sniff traffic and perform session
hijacking. Encryption protocols were developed in order to address some of the challenges to
security in wireless communications. The process of encryption transforms the information to a
different form, making it difficult for anyone other than the communicating parties to decipher
the message. The Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA)
protocols are the major wireless network encryption protocols.
4. Cybersecurity Laws and Regulations
In at least two pages, identify one cybersecurity law that interests you and explain its
purpose and scope. Is there anything about the law that you would suggest as a change or
update? Explain briefly.
Check the below links which pertains to a number of cybersecurity laws and regulations in
different areas such identity theft, national security, privacy, health information and internet
commerce.
NIST Special Publication 800-53 https://en.wikipedia.org/wiki/NIST_Special_Publication_800-
53
FDA 21 CFR part 820/806 (Quality System Regulation) -
https://excelsior.instructure.com/courses/14461/files/8542346/download?wrap=1
PCI DSS - https://www.pcisecuritystandards.org/
21 CFR Part 820 Quality System Regulation Applying Principles of Lean Documents -
https://www.youtube.com/watch?v=r5yzriLRE1g
Cyberdefense partners - https://www.everycrsreport.com/reports/R44417.html
Critical partnerships -
https://excelsior.instructure.com/courses/14461/files/8542342/download?wrap=1
All answers should be in APA format with cited sources. You should have at least 2
sources for each question. [Show Less]