Preview

16 Mobile Devices and Social Networking Security Solution

Better Essays
Open Document
Open Document
2535 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
16 Mobile Devices and Social Networking Security Solution
Aman Jain and Shilpa Mehta

85

Mobile Devices and Social Networking Security Solution
Aman Jain and Shilpa Mehta
Abstract: Nowadays almost everyone is using smart phones. They are becoming an essential tool in human being’s everyday life. They are not only used for mere communication such as calling or sending text messages; however, they are also used in applications such as for accessing internet, receiving and sending emails and storing documents. As a result of this, not only phone numbers and addresses are stored in the mobile device but also financial information and business details which definitely should be kept private. And if the device is being stolen, each and every information is in the hands of the new owner. That’s why; the biggest challenge is the security. When it is necessary to confirm the user identity on systems to perform a given operation, the term User Authentication is used. Traditionally, people prove their identity by providing passwords. The average person today has about 25 password protected accounts (according to Microsoft study), more passwords than they can reasonably be expected to remember. People compensate by using the same password for multiple accounts, and by choosing passwords that are easy to remember. But, unfortunately easy to remember means easy to guess. Other user select difficult passwords but then write them down where unauthorized eyes can find them. That’s why, identity based on what you know (login and password) and what you have (ID cards) can be easily stolen. As we want trust (security), the notion what you are is a new opportunity to user authentication. Biometric Authentication is answer for that. Biometric is a characteristic of human being that distinguishes one person from another. For example, finger prints, retina, face recognition, etc. This can be used for identification or verification of identity. Keywords: FAR, FRR, ROC, EER, FTE, FTC. B.

2.
A.

BIOMETRICAUTHENTICATION IN SOCIAL

You May Also Find These Documents Helpful

  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Best Essays

    There are thousands of applications that have been developed for mobile devices which perform a myriad of tasks and processes. In the beginning most of these applications were games. Businesses later joined the mobile revolution and developed their own business based applications to run on these mobile devices. Many mobile business applications can now streamline business processes, reduce operational processing times and provide better customer service. The mobile revolution has forced many industries to reengineer their business processes…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures on these devices are not stringent, making it easy for an unauthorized person to intercept this information. Even though a college computer network may have numerous levels of protection, the system cannot easily track student authentication when mobile devices are used. This lack of authentication provides easy access for even a semi-skilled hacker to the user ID/password combination. Once the hacker has this information, he or she can take over…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    After Amir receives a call from Rahim Khan informing him that Hassan has a son named Sohrab, Amir takes this as a possible chance to redeem his childhood mistakes. Amir goes back to his jarring homeland of Afghanistan to search for Sohrab and eventually is lead to a Taliban official. This officer happens to be Assef, the bully of Hassan who raped him in his childhood. Amir tentatively and bravely approaches him in hopes to make a deal and bring Sohrab to safety. Assef starts brutally beating Amir and releases a feeling Amir has not felt in a while. The feeling uncomfortably excites Amir as he “doesn’t know when [Amir] starts laughing, but [Amir] did...The harder [Amir] laughs, the harder [Assef] kicks, punches, and scratches. ‘WHAT’S SO FUNNY?’…

    • 229 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    The students will research best practices for private sector and public sector authentication as it relates to e-commerce and on-line banking. Then they will research the best practices for remote access for employees through public Internet and for employees of city, county, state, and federal governments, based on DoD standards for secure remote access. Multi-factor authentication and restrictions based on data types and sensitivity as discussed in previous labs are major considerations for this research when investigating RADIUS, TACACs+ and WLAN authentication methodologies.…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    Tiny, portable gadgets, such as pocket digital assistants (PDAs) and mobile phones have been in the recent years pushed on the mark. Mobile or ubiquitous computing and handy gadgets are changing the relations between computers and humans.there is an introduction of a new communication approach based on context. This approach enables people to interact with computers, objects and environments seamlessly. Mobile computing devices have enabled composite cooperation and communication patterns that were not dreamt of in the past years. They possess vital features in portability, ability to share information using communication networks; wireless, and synchronizing the information with other standardized gadgets. There have drastic changes in the technological landscape in the past years led by the emergence of mobile computing devices focusing on consumer preferences.…

    • 1381 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    One of the most reasons for people not using mobile banking is the security concern. So how to improve security on people’s mobile devices has become a very important thing. They can make an external device for their mobile banking. The external device can insert into the headphone jack on smartphone. After the connection, customer should slide their card, and then system will be prompted to enter some personal authentication information, and then will send a message for their smartphone to get the verification code before use the mobile banking to do their account activities. Customer can get this external device for free if…

    • 392 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Biometric is a tool used to identify and reliably confirm an individual’s identity on the basis of physiological or behavioral characteristic (combination of both) which are unique for a specific human being. Biometric technology has been around for so many years and the technology has being used as the latest weapon to fight against crime. The scope of this paper is reflecting on biometric in terms of ethical and privacy issues. There are a number of ethical issues centering on biometric concerning privacy rights of individuals. Examples of biometric technology are fingerprints, facial recognition, DNA, palm print recognition, hand geometry, iris recognition, odor recognition and etc. These devices are being used more and more around the world each day. Some examples are: places like airports, Walt Disney, office buildings, banks, military, government facilities and the list goes on and on as we rely on this technology to help identify us for our security. This technology has been used in many ways to protect our personal identity. In fact biometric is tightly linked to an individual and it is difficult to duplicate a biometric trait, it can prevent identity theft and rule out the use of several identities by a single individual, however one concern is about the stored biometric data.…

    • 1023 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Computer Security

    • 414 Words
    • 2 Pages

    A biometric device is one that verifies personal characteristics to authenticate a user. Examples of personal characteristics are fingerprints, voice pattern, signature, hand size, and retinal (eye) patterns. “A biometric device usually translates a user’s personal characteristics into a digital code that is compared to a digital code stored in the computer” (Victors, 7). If the digital code in the computer does not match the user’s code, access is denied. Each of these authentication techniques has advantages and disadvantages.…

    • 414 Words
    • 2 Pages
    Good Essays