Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The master’s program requires a number of courses that focus on the breadth of y

ID: 3575771 • Letter: T

Question

The master’s program requires a number of courses that focus on the breadth of your professional field. The final exam is to examine and synthesis your major 6000 project and explain how the core courses are or are not reflected in the theoretical development of your course project.

Topic of my Project: Biometrics: Future of Secure Identification and Authentication

My core Courses: -

ITM 5000: Introduction to Information Technology

ITM 5100: Information and Communications Systems and Networks

ITM 5200: Project Management of Information Technology

ITM 5300: Procurement and Contract Management for Information Technology

ITM 5400: Systems Analysis, Design and Implementation

ITM 5600: Information and Communications Security

Explanation / Answer

Biometrics : Future of secure Identification and Authentication
Biometrics is related to human characteristics. Biometrics is used for security and authentication in computer and mobile phone as well.Biometrics identifiers are the distinctive,measurable characteristics used to label and describe individuals.Biometrics can be categorize as physical versus behavioural characteristics.Biometrics is not limited to fingureprint,palm veins, face recognition, DNA, etc.
We are very used to traditional means of access control such as token based authentication like driver's license or passport or password or personal identification number.
Many different aspects of human physiology,chemistry adn behaviour can be used for biometric authentication.Certain biometrics will be better than others based on the required levels of convenience and security.
Now we relate core courses to this topic whether they are reflected in the project's theoretical development.


Introduction to Information Technology
Biometric authentication technologies use the unique characteristics (or attributes) of an individual to authenticate the person's identity. These include physiological attributes (sucha as fingureprints, hand geometry or retina patterns) or behaviour attributes. Biometric authentication technologies based upon these attributes have been developed for computer log in application. Biometric authentication is technically complex and expensive and user acceptancecan be difficult.
Biometric system provide an increased level of security for computer systems, but the technology is still new as compared to memory tokens or smart tokens.Biometrics authentication devices provide imperfection resulting from technical diificulties in measuring and profiling physical attributes as well as from the somewhat variable nature of physical attributes.


Information and Communications Systems and Networks
Network security can be work as biometric authentication. Biometric is the unique measure of teh identity of individuals with their behavioural and physiological traits like face, fingureprint,iris,retina, palm-print etc.
crypto-biometric system however has some issues.ANy biometric systems need to provide biometric system should not leak any information about the biometric features. It is also required to provide revocability to be irrevocable biometric data. In password-based authentication systems or token based authentication systems passwords, or tokens are easy to chagne while it is compromised. But biometric traits are inherent and fixed forever that is the biometric data is ireevocable. The owner of biometric traits is not revoke her biometric when it is compromised.
In this way we can achieve biometric network security.


Project Management of Information Technology
Project management of infomation technology is not much more reflective in biometrics theoratical development. As project management mainly focus on under development projects and its lifecyle whereas biometric systems are well managed and efficient.
Procurement and Contract Management for Information Technology
This will be the same case as above which is justifiable that it is not relate to under go project development cycle.Also procurement and contract management is something that govern the projects individual module. That is not the case here.


Systems Analysis, Design and Implementation
System analysis of biometric system and analysis and design is integral part of this system to work.For different application, biometric system can analyse to how to install it properly and make the best way out of it.Design and implementation of the biometric system can very as per the application and its uses.like now mobile biometric authentication can be implements and design according to phone standards and also cope up with phone software.So it should be first design analyze and implemented accordingly. Like if you want to migrate biometric authentication of fingure than you have to embed hardware of fingure print scanner and its related software to built with.


Information and Communications Security
Communication and information security like phone biometric authentication and also encryption,phone locks, etc can be implemented as communication security. Information anf communication technologies are inter realted and can be hanced for biometric authentication like eye recognization or DNA matching that can be goes to different level of security. This core subject is much related to first two core subjects and its application and implementation can be justifiy with summation of the two subjetcs.