Help with TPS & Biometric security (1 Viewer)

sarahhartson88

New Member
Joined
Nov 18, 2007
Messages
2
Gender
Female
HSC
2008
[FONT=&quot]I was just studying for the trials, sooo stressful!!! and a question came up that i couldn't solve.
i really dont understand biometric security and the realtion to TPS.
THe question has 3/4 space of writiing, so if some one can fulfil this, i will be really thankful :)

What is biometric security? What other newly emerging
methods of security are available for transaction processing systems.

also i would like to see other people opinions of these 2 questions

How is the future of data entry jobs in the twenty first century likely to compare with the history of clerical jobs in the twentieth century?

and

“The only totally secure computer is locked in a room and is completely isolated from all computer networks”. Discuss the validity of this statement and list more practical ways of protecting your data.

basically i want to compare, and see how i can change my answer to a full mark one :)

thanks
[/FONT]
 
Last edited:

Forbidden.

Banned
Joined
Feb 28, 2006
Messages
4,436
Location
Deep trenches of burning HELL
Gender
Male
HSC
2007
Well, it's been a while since I did IPT.

An example of biometric security is fingerprint recognition where each person can be recognised by their fingerprint as everyone has a unique fingerprint.
When you think of transactions you may think of purchasing goods, transactions apply when a change of data is taking place.

How is the future of data entry jobs in the twenty first century likely to compare with the history of clerical jobs in the twentieth century?
Future data entry jobs are performed using computers and will likely to be automated which will result in job redudancy but done at a much faster pace compared to traditional methods.


“The only totally secure computer is locked in a room and is completely isolated from all computer networks”. Discuss the validity of this statement and list more practical ways of protecting your data.
The point of data security is to restrict access to data only to authorised individuals and doing the above is not productive because it prevents anyone even those who are authorised to access the data.
You may consider encryption as a method of protecting data.
 

sarahhartson88

New Member
Joined
Nov 18, 2007
Messages
2
Gender
Female
HSC
2008
thanks!!

i'll try to use that

also if other people have other answers please help as well :)
 

mijoe

Member
Joined
May 18, 2008
Messages
72
Location
Behind you
Gender
Male
HSC
2010
[FONT=&quot]That other guy is really smart. He should be everybody's teacher. I don't do this Topic but I'm gonna try and answer it to be best of my ability.

What is biometric security? What other newly emerging
methods of security are available for transaction processing systems.

Biometric security is where physical attributes are used for identification or authorisation. Different possiblities are voice recognition, fingerprint, hand geometry DNA, retinal scan, Iris, face thermograph or even odor. Transactions are not necessarily just purchases. It involves any activites or products that are part of the normal operations of an organisation.

How is the future of data entry jobs in the twenty first century likely to compare with the history of clerical jobs in the twentieth century?

In the past clerical jobs involving data entry would involve writing entries and then stored them in something such as a filing cabinet. This method is very slow and uses a lot more space compared to modern methods. Nowadays, data entry jobs involve skilled typists and the data is often stored electronically in a database. This is much faster and efficient as well as taking up much less physical room to store data.


“The only totally secure computer is locked in a room and is completely isolated from all computer networks”. Discuss the validity of this statement and list more practical ways of protecting your data.

The statement is not completely valid. Using encryption such as DEA, IDEA or RSA will protect your data more than 99% of the time. DES and IDEA use private keys which means only certain people can encrypt/decrypt their data. RSA on the other hand uses a public key. This means that by using an algorithm on the private key, a public key is generated and is only able to encrypt the file but is unable to decrypt it. This means that the private key holder is able to post his private key publicly with very little risk to his data since he is the only who can decrypt it with his private key. With current technologies, it would take all the computer in the world working for longer than the age of the universe to find the correct private key for a public key. This is unless they are extremely lucky. A password will also suffice in circumstances where the data is not too important, but encryption and decryption is a very fast process nowadays anyway. Many social issues arise with the creation of the public key system as it allows terrorists to hide their secret messages without any risk of it being intercepted and read.


[/FONT]
 

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

Top