- If you forget your passphrase and/or keyfile then there is almost no chance of recovering your data.
- Some forms of encryption only offer nominal protection and can be broken easily with the right program e.g an older ZIP archive or Word Document.
- Some encryption programs are too complicated for the everyday user and they may end up using them incorrectly. This could lead to securing data which they did not wish to encrypt or failing to encode data which they did wish to protect.
- The very existence of encryption programs or encrypted files will attract suspicion as to what it is you are trying to protect whereas a non-encrypted system would not attract the same level of interest.
- With reference to the above point, in certain countries such as the UK, Police can use legislation to compel you to reveal passwords to encrypted data. You could face jail time if you failed to comply.
- Certain types of encryption software are banned in some countries. For example, US versions of the program PGP cannot be exported outside the country.
- As Encryption protects your personal data e.g bank details, love letters etc. it also protects drug dealers who make deals from having their messages intercepted, terrorists planning attacks and paedophiles peddling child pornography.
Tuesday, August 9, 2011
ADVANTAGES OF ENCRYPTION
* ENCRYPTION IS AUTOMATIC SO THERE IS LESS OPPORTUNITY FOR HUMAN ERRORS.
*IF SOMEONE DOESN'T KNOW WHAT YOUR SENDING THEM IT REMAINS PRIVATE.
*IT KEEPS OTHER FROM BEING ABLE TO EASILY READ YOUR PRIVATE INFORMATION THAT HAS BEEN ENCRYPTION.
*IF THE COMMUNICATIONS LINK OPERATES CONTINUOUSLY AND CARRIES AN UNVARYING LEVEL OF TRAFFIC, LINK ENCRYPTION DEFEATS TRAFFIC ANALYSIS.
DISADVANTAGES OF BOIMETRIC
· * The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.
· * It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time.
.
· * For people affected with diabetes, the eyes get affected resulting in differences.
· *Biometrics is an expensive security solution.
ADVANTAGES OF BIOMETRIC
* Increase security - Provide a convenient and low-cost additional tier of security.
* Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy punching.
* Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorised use of lost, stolen or "borrowed" ID cards.
* Reduce password administration costs.
* Replace hard-to-remember passwords which may be shared or observed.
* Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access
* Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!
* Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance.
* Unequivocally link an individual to a transaction or event.
some problems with fingerprint biometrics
1. Fingerprint readers are fairly easy to fool. Researchers have used photocopies of fingerprints to fool the reader. We leave fingerprints all over the place, including on the fingerprint reader. Anyone one wanting to gain access could lift off the fingerprint and make a copy to fool the reader.
2. False positives. If the software is not sufficiently sophisticated, the system could give access to someone who should not have access.
3. False negatives. The reader may not recognize a valid user as having permission to gain access. This could be a result of a dirty scanning surface or some changes in the user's finger that make it impossible for the software to make a match. For instance, the reader may not recognize a user's finger that has a cut or a burn.
Biometric pattern recognition software is getting more sophisticating making false positives and negatives less likely. However, the problem of fooling the reader is a serious one. You should never use a fingerprint reader as the primary method of securing access to sensitive information or physical areas.
Monday, July 4, 2011
Monday, June 20, 2011
Law,Ethics,Computer Technology
Law
----->> is a system of rules and guidelines, usually enforced through a set of institutions.It shapes politics, economics and society in numerous ways and serves as a social mediator of relations between people. Contract law regulates everything from buying a bus ticket to trading on derivatives markets. Property law defines rights and obligations related to the transfer and title of personal and real property. Trust law applies to assets held for investment and financial security, while tort law allows claims for compensation if a person's rights or property are harmed. If the harm is criminalised in a statute, criminal law offers means by which the state can prosecute the perpetrator. Constitutional law provides a framework for the creation of law, the protection of human rights and the election of political representatives. Administrative law is used to review the decisions of government agencies, while international law governs affairs between sovereign states in activities ranging from trade to environmental regulation or military action.
Ethics
----->> The study of the general nature of morals and of the specific moral choices to be made by a person; moral philosophy.
Computer Technology
----->>computer technology refers to the design, construction and programming of computers. This broad definition encompasses a few major areas such as hardware, software and networking. Advanced areas involve artificial intelligence, robotics and biomedical forensics.
Subscribe to:
Comments (Atom)



