scholarly journals Role of Biometric security for The Enhancement of Data Security

2015 ◽  
Vol 14 (10) ◽  
pp. 6184-6189
Author(s):  
Himanshu Gupta ◽  
Kapil Chauhan

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of  making  biometric security systems, the  important area of concern is that how do  one can implement the biometric security for increasing of data security.  First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use  fingerprint recognition for authentication process  it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast.  In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.

Author(s):  
Pankaj Mishra ◽  
Dev Ratna Singh

Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.


Author(s):  
Pankaj Mishra ◽  
Dev Ratna Singh

Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.


2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


Author(s):  
Sue Milton

The proliferation of data exposure via social media implies privacy and security are a lost cause. Regulation counters this through personal data usage compliance. Organizations must also keep non-personal data safe from competitors, criminals, and nation states. The chapter introduces leaders to the two data governance fundamentals: data privacy and data security. The chapter argues that data security cannot be achieved until data privacy issues have been addressed. Simply put, data privacy is fundamental to any data usage policy and data security to the data access policy. The fundamentals are then discussed more broadly, covering data and information management, cyber security, governance, and innovations in IT service provisioning. The chapter clarifies the complementary fundamentals and how they reduce data abuse. The link between privacy and security also demystifies the high resource costs in implementing and maintaining security practices and explains why leaders must provide strong IT leadership to ensure IT investment is defined and implemented wisely.


2019 ◽  
Vol 8 (2S8) ◽  
pp. 1750-1753

More connected devices bring amazing benefits to people and enterprises. However, they also create more digital doorways. The risk in IoT is not just financial. IoT connecting medical devices, running city infrastructure and even the houses we sleep in. Connected gadgets and sensors in our homes and working environments known as the Internet of Things-offer gigantic potential for improving how internet live and move around. We can quantify wellbeing information, travel propensities and vitality use. In any case, as more gadgets become associated, vulnerable they are to complex digital security dangers. Connected devices and sensors in our homes and workplacesknown as the Internet of Things-offer huge potential for improving how we live and move around. We can measure health data, travel habits and energy use. But as more devices become connected, the more vulnerable they are to sophisticated cyber security threats. There exist a few application security issues; for example, data access and user authentication, data protection, decimate and track of information stream, IoT platform stability, middleware security, the executives stage, etc. An effective trust management model is to be used in each IoT framework to ensure the framework against malevolent assaults and consequently ensuring dependable and secure data transmission. To achieve this objective, various trust management models are used to enforce different security measures in a social IoT system. Two different trust management models namely dynamic model and machine learning based model are clarified and correlation of model are expressed and along these lines the benefit of one model over the other is comprehended.. Appropriately in this paper, a detailed study of each model is done with other pinpoints thus leading to a thorough study of two diverse trust management models.


An alternative to traditional text-based password is being proposed. This aims to enhance the safety and security of the current system by adding a layer of additional security, the proposed system uses FIDO (Fast Identity Online) which unlike password catalogue, stores personally recognizing information data locally on the handler's device to defend it. FIDO's personal identification and local storing of biometric is an intended way to ease user apprehensions about personal data. Image-captchas have lately developed into a very prevalent and extensively organized crossways throughout the online networks to guard from the offensive things. Still, the developing competence in the system field has steadily weakened the safety of Image-captcha and has exposed them to attacks. Built on our valuation, we roughly recognize the defects in these methods of prominent structures, laterally with the perfect performance and plan. Ideologies for more secure captchas are formed from our findings which lean-to light on the considerate of measure and impact, for captcha solving.


2018 ◽  
Vol 3 (2) ◽  
pp. 85
Author(s):  
Chicherov K.A. ◽  
Norkina A. N.

This article presents issues of protecting confidential data, ways to support information security, types of information security threats resulting in an authorized access to confidential data, countermeasures and security measures to ensure confidential data security. Keywords: confidential data, information security, information security threat(s), personal data, information systems, data security.


Data security is a process of enhancing the data privacy measures to filebase, database, websites while preventing unauthorized access to the datasets and data-streams. Encryption is the key data security technique that prevents the access of digital data from unauthorized person or hackers. This research work proposes a novel approach using data transformation and encapsulation techniques namely Hadamard Transform along with DNA Cryptography and Amino Acid for enhancing data security.


2020 ◽  
pp. 31-35
Author(s):  
Oksana MAKOVETS ◽  
Iryna DROZD

Introduction. As a component of the business environment the information environment is characterized by significant cyber threats and requires cyber protection. The processes of Ukrainian society digitalization and changes in providing the information security update the enterprise's financial security measures and their connection with cybersecurity. The purpose of the paper is to analyze the essence of cybersecurity as a factor of the enterprise's financial security and to identify its impact on the investment attractiveness of the business entity. To achieve the purpose the task is to explore the concepts of financial security, cybersecurity and cyber threats, to identify their relationship and impact on business' financial losses of the, the consequences for the enterprise's investment attractiveness. The study will provide information on business management and plan effective policies to combat cyber threats. Results. The essence of enterprise's financial security is investigated. There are three approaches in identifying the essence of this concept, including as part of the enterprise's economic security, as the state of the most effective use of information, financial indicators and as its financial condition level, which provides stable protection of priority balanced financial interests from real and potential external and internal threats. These definitions are used to substantiate the connection with the concepts of cyber threat and cyber security. The areas of possible losses based on the losses assessment due to cyber threats are identified by the authors, namely the intellectual property loss, the business information loss, the IT systems' continuity disruption, the reputation damage as a result of the attack, the automated personal data loss. Conclusion. It is concluded that the necessary measures of cybersecurity, protection of enterprises' information resources and prevention of unauthorized interference in the enterprises' activities, which has a positive effect on investment attractiveness and increases the enterprises' competitiveness.


Author(s):  
Prof. Ms. Tejaswini Untawale

Abstract: Cyber security acknowledges an enthusiastic job in the space of data innovation. Shielding the data has become a gigantic issue in the current day. The cyber security the primary concern that begins as a top priority is 'digital violations' which are increasing on large scale. Today, network protection is at a critical concern to many. At whatever point we contemplate the network protection the primary thing that rings a bell is 'digital wrongdoings' which are expanding colossally step by step. This paper generally points out on the network protection, cybersecurity and digital psychological warfare. The digital psychological oppression could cause relationship to lose billions of dollars in the area of associations. Keywords: Network, Cyber Security, Digital, Data Security


Sign in / Sign up

Export Citation Format

Share Document