, Contents
Section I.................................................................................................................................................2
TECHNIQUES FOR MINIMISING SECURITY BREACHES............................................................................2
1. Security Policy................................................................................................................................2
3. Web Security & Filtering................................................................................................................3
4. Wireless Security............................................................................................................................3
5. Email Security and Filtering............................................................................................................4
7. Anti-Virus.......................................................................................................................................5
Section II............................................................................................................................................6
AUTHENTICATION AND BIOMETRICS.....................................................................................................6
1. What is authentication?.................................................................................................................6
2. How passwords work to authenticate a person.............................................................................6
3. Explain 4 different biometrics to authenticate a person................................................................7
Iris scanner.....................................................................................................................................7
Fingerprints....................................................................................................................................7
Voice recognition...........................................................................................................................8
Facial Patterns................................................................................................................................8
Section III...............................................................................................................................................9
COMPARISON OF THE SECURITY BENEFITS OF DIFFERENT CRYPTOGRAPHY TECHNIQUES....................9
1. Data Encryption Standard (DES).....................................................................................................9
2. Rivest-Shamir-Adleman (RSA)......................................................................................................10
3. Pretty Good Privacy (PGP)............................................................................................................11
References:
https://www.goodfirms.co/glossary/web-security/
https://www.techopedia.com/definition/4099/security-policy
https://www.barracuda.com/glossary/web-filtering
https://www.lifewire.com/k9-spam-email-filter-1164807
https://www.comodo.com/resources/home/how-firewalls-work.php
https://antivirus.comodo.com/how-antivirus-software-works.php
https://searchsecurity.techtarget.com/definition/authentication
https://www.eff.org/pages/iris-recognition
Section I.................................................................................................................................................2
TECHNIQUES FOR MINIMISING SECURITY BREACHES............................................................................2
1. Security Policy................................................................................................................................2
3. Web Security & Filtering................................................................................................................3
4. Wireless Security............................................................................................................................3
5. Email Security and Filtering............................................................................................................4
7. Anti-Virus.......................................................................................................................................5
Section II............................................................................................................................................6
AUTHENTICATION AND BIOMETRICS.....................................................................................................6
1. What is authentication?.................................................................................................................6
2. How passwords work to authenticate a person.............................................................................6
3. Explain 4 different biometrics to authenticate a person................................................................7
Iris scanner.....................................................................................................................................7
Fingerprints....................................................................................................................................7
Voice recognition...........................................................................................................................8
Facial Patterns................................................................................................................................8
Section III...............................................................................................................................................9
COMPARISON OF THE SECURITY BENEFITS OF DIFFERENT CRYPTOGRAPHY TECHNIQUES....................9
1. Data Encryption Standard (DES).....................................................................................................9
2. Rivest-Shamir-Adleman (RSA)......................................................................................................10
3. Pretty Good Privacy (PGP)............................................................................................................11
References:
https://www.goodfirms.co/glossary/web-security/
https://www.techopedia.com/definition/4099/security-policy
https://www.barracuda.com/glossary/web-filtering
https://www.lifewire.com/k9-spam-email-filter-1164807
https://www.comodo.com/resources/home/how-firewalls-work.php
https://antivirus.comodo.com/how-antivirus-software-works.php
https://searchsecurity.techtarget.com/definition/authentication
https://www.eff.org/pages/iris-recognition