MMIS 221 Module 3.3 Case Study: Cybersecurity|Latest Update with complete solution
Module 3.3 Case Study: Cybersecurity
Demario R. Williams
Embry-Riddle Aeronautical University
MMIS 221 – Introduction to Management Information Systems
Professor Terry Gooch
May 05, 2024
, 2
Cybersecurity
In the always changing world of cybersecurity, biometric access methods are a defense
system that safeguards against identity theft and unwanted access. Because biometric
identification is based on distinct physical characteristics such as fingerprints, face recognition,
or even retinal patterns, as opposed to ordinary passwords or PINs, it is far more difficult for
criminals to bypass security measures. Organizations in an array of industries, including
government and finance, use biometric technologies to bolster their digital barriers. For example,
banks use fingerprint scanners to confirm customers' identities while doing business, while
border control agencies use facial recognition software for better border security. Such
applications emphasize the critical role that biometric access techniques play in protecting
sensitive data and infrastructure from cyber-attacks, while also enhancing security and
streamlining user experience.
Biometric access is a key component in cyber defense strategy which aims to dictate
policies, procedures and technologies that protect digital assets from cyber attacks. The strategy
involves preventing, detecting, responding and recovering from the vulnerable situations.
Biometrics fall under the category of general defense controls, and the sub category access
controls which focus on the two step process of identity verification, and the grant or denial of
specific permissions on a computer or mobile device (Turban, 2021). The concept of biometrics
started in the 14th century, with the Chinese putting ink on children's feet to identify them. Five-
Hundred years later French scientist and police officer, Alphones Bertillon utilized the rich
groves on the inner ends of fingers to identify offenders, thus starting an identification system
based on physical measurements in law enforcement (Khoury, 2013).