Cybersecurity Planning

  • . Some common biometric techniques include:
  • In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.
  • Fingerprint recognition

  • Signature dynamics

  • Iris scanning

  • Retina scanning

  • Voice prints

  • Face recognition

Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.

  • 2. You learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

SAMPLE ASSIGNMENT

Sample-2

Powered by WordPress