Cybersecurity and Our Food Systems

  • 60,000+ Completed Assignments

  • 3000+ PhD Experts

  • 100+ Subjects

Question:

Discuss about the Cybersecurity and Our Food Systems.

Answer:

Introduction:

CIA triad is nothing but a guide which is generally used for taking measures in information security. Information security has an idea about how information technology can be used easily. Information technology are widely used in various kinds of homes and organization (Farooq et al., 2015). This ultimately relates to the fact that organization and homes are mainly associated with information security issues. Information security teams makes use of CIA triad for development of security measures. CIA triad mainly focus on utilization of fundamental goals which must be inclusive of measures of information security (Mosenia, & Jha, 2017). CIA triad generally acts like a tool which is used as a guide for providing security to information system and networks which are related to technological assets.

CIA triad is a well-known model which mainly has three goals for achievement of security. A wide range of factors are mainly used for analyzing security situation in information security and networks along with some kinds of factors (Russell & Chow, 2017). There are certain number of assumption which can be used which has some factors which is considered to be important in information security. There are mainly three goals of CIA triad. These are confidentiality, availability and lastly integrity. Confidentiality, integrity and availability are considered to be most important kinds of concepts in information security (Fernandez & Alexander, 2016). The ideas and concept of triad are mainly considered to be important part or core objectives of information security objectives.

Confidentiality is nothing but protection of important information from unauthorized kinds of access (Onuchowska & de Vreede, 2018). The goal of CIA triad focus on the need of protection of information. Confidentiality generally requires certain number of measures to check the fact that only authorized kind of people are mainly associated for accessing information. For example, confidentiality is generally for a system file if authorized kind of user is able to access it, on the contrary it blocks unauthorized kind of person from accessing it (Ali & Afzal, 2017).  Confidentiality in CIA triad is generally related to information security because information security mainly requires proper kind of control on the access of information which is considered to be protected.

CIA goal of integrity is nothing but a condition in which various kinds of information are kept consistent and accurate until and unless any kind of authorized changes are made (Jain, Jain & Kapil, 2016). It is generally considered to be possible to make changes as a result of careless access and use or unauthorized kind of access. In CIA triad integrity is generally maintained in which information remains unchanged during various kinds of phases like storage, usage and transmission. It also ensures the fact that usage does not involve any kind of modification related to information. Integrity is mainly related information security because it is considered to be accurate and consistent information which is mainly arises due to proper kinds of protection (Bakar et al., 2018). CIA triad often requires measures of information security measures for proper control and monitoring of authorized kinds of access, transmission of any kind of information.

CIA triad goal of availability is nothing but a situation in which is available when and where is required in right (Sagar et al., 2015). The main objective of CIA triad is that information should make available when any kind of authorized users needs to access it. Availability is generally maintained when the various components of the information security are working in proper order. Problems in various kinds of information security is that in most of the cases it is considered to be impossible for accessing a particular information. This ultimately relates to the fact that the particular information is unavailable (Shubhangi et al., 2016). In CIA triad, availability is mainly linked to certain number of information security because various kinds of effective measures generally protect the various components of a system. It also ensures the fact proper kind of information is available to an individual.

In CIA triad confidentiality, availability, integrity is considered to be basic kinds of goals of an information security system (He & Wang, 2015). In many cases it is seen one goal is considered to be important than other. Information security mainly protects valuable kinds of information from any kind of unauthorized access, distribution and any kind of modification. CIA triad puts efforts to information security to that it can easily achieve success in long run. The priority of goal of CIA triad is generally decided by the IT team, information security individual or an individual kind of user to decided which kind of goal is prioritized as per the needs (Alsaadi, 2015). CIA triad generally requires organization and individual users to take certain number of steps for maintaining confidentiality, integrity and availability of any kind of information.

In this question we are given a situation in which a thief easily broke into the automated teller machine by making use of screwdriver. He was able to jam the card reader and broke five number of keys from the keypad of the machine (Qizi, 2015). The thief has to halt for the process of breaking as a customer approached for using the ATM. The customer can easily enter his card, but the customer was not able to withdraw ATM card and so he went out for some kind of help. In the meantime, the thief came out and tried a number of ways for discovering the pin number of the customer so that he can easily steal a large amount of amount of money from the machine.

The maximum number of pins which the thief may have enter before discovering the customer pin is calculated by making use of permutation technique from mathematics (Bhagavatula et al., 2015). The total number keypad of an ATM machine is ten that is from zero to 10. Now in this particular situation the thief has broken five keys so more five keys will be available to him for making the inputs. The pin number of an ATM machine is made up of four numbers. So after breaking five keys five keys four-digit pin number is entering by the remaining five keys which are available to him. It can be calculated by making use of permutation

5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120.

So the total number of possible outcome is this particular situation is 120. But as per ATM security a user can enter pin for maximum value of three. But after three wrong inputs the ATM card gets blocked. So keeping the security of ATM machine in mind the maximum time which the thief can enter pin is three. But after three trials made by thief the card will be automatically blocked.

There are large number of advantages which can be obtained from the idea of biometric. But a large number of issues or problem are encountered while using (Pagnin & Mitrokotsa, 2017). The three reason which is considered to be reluctant for the use of biometric are as follow like:

The main reason which is considered to be reluctant for the use of biometric is nothing but the idea or concept of security (Kremic, 2017). In the concept of biometric various kinds of information regarding a person is mainly stored in the database. The information is mainly inclusive of address, phone number and other kinds of personal details. Now if the database of a particular system is hacked then it can easily affect a user (Johnston & Weiss, 2015). It can easily result in leakage of some kind of personal information. In many times it is seen that hackers take the identity of an individual by making some kind of illegal activity which can be in the terms of unethical event. A large number of attacks which are based on biometric system have been considered to be successful over the years (Lippi et al., 2017). Fingerprint system makes use of fingerprint for various kinds of authentication. It merely focuses on use of fingerprint could be used for authentication of large number of users. Similarly, hand geometry focus on various kinds of superficial attacks.

There can be various kinds of errors in the technology of biometric. The main parameter which is considered is false acceptance and false entry (Deokar & Wakode, 2017). Various biometric system does not have any kind of idea or logic related to identity of a person and accessing a particular kind of area which is provided to a person. Failure rates can be considered to be critical consideration in most of biometric system. Two type of failures rates are observed that is false acceptance and false rejection. The failure rates mainly analyze how the system can verify each kind of user against the specific characteristic which is register against them. Thus a system must which is configured must be precise and along with low number of false acceptance rates (Dere, Gurjar, & Sipna, 2016). This is mainly required for ensuring a balancing a system. A system which provides lower value of acceptance is likely to be easily granted for ensuring positive kind of customer experience is provided.

Mapping system is considered to be an important aspect in biometric. Mapping in this particular kind of system is mainly done related to information and use of fingerprint (Dere, Gurjar, & Sipna, 2016). This is system in which a particular case needs to be more accurate. In some of the cases, it is generally observed that identification is generally stored in the system but that particular might not be able to recognize that person. It will ultimately result in delay of the entry of that particular person. In some of the cases it is seen that functionality of the whole system is affected.

Countered objections

Multifactor authentication is nothing but implementation of certain number of process for encountering large number of problems. Multifactor authentication of a system can be considered as a type of system which requires one particular method of authentication for various kinds of authentication (Holz & Knaust, 2015). This particular method is considered to be a method for identification of method as a beneficial way by the help of user name, password and fingerprint. In this method each user needs to have a particular name and password which is activated to certain number of concerned users and this is not be disclosed by any other kind of person. This particular aspect mainly checks increasing the security which mainly achieved from the given concept.

Gradient biometric team is this particular domain of biometric has been more than 10 years and has achieved a lot of success in this particular field (Lumini & Nanni, 2017). As per this organization three important aspects should be taken into consideration like comfort, availability and safety of an individual. There are three concepts which must be included in this particular point for achievement of desired security standard.  Access to a particular database of a customer is always considered and delivered to large number of user when they need information. In many situations it is seen that network and linkage between information and access permission fails which ultimately does not allow patch to access permission. This is the ultimate concept of biometric.

A large number of issues can be encountered in Biometric that is it focus on reasonable which is considered to be secure and trustworthy in many cases (Jain, Nandakumar & Ross, 2016). Some of the issues of biometric are rouge sensors and unauthorized access, proper kinds of communication between various kinds of sensors and biometric databases, accuracy, speed, cost, resilience and lastly privacy.

A false negative can be considered to a situation in which biometric user cannot get easy access to location of biometric (Haque, Nasrollahi & Moeslund, 2015). There can be many kinds of situation like identity of a person is stored in database but no kind is access is provided to that person due to any kind of technical issues in the system. In major of the cases it is seen that false identity person gets proper identity which ultimately results in idea of miss identity. In the first situation it is seen that identity of a person is not known. In major of the cases it can create a large number of issues due to the fact that it can easily restrict the identity of a person for various kinds of activities (Haque, Nasrollahi & Moeslund, 2015). In second situation it is seen that a concept can be taken into consideration is the aspect of loss of any kind of identity. Other person can easily make use of that identity and easily involve into some kind of illegal activity by taking identity of other person. There are large of illegal activity which are offered in recent times by making use of system of biometric. This idea is considered to be few kind of aspects by involving high amount of concern so that it can easily take consideration (Choi, Lee & Yoon, 2016). The system can be considered to be more security based with high level of service which is associated with this particular technology. By taking consideration of the various levels of the organization it can easily shut down the whole kind of infrastructure, various kinds of things which are mainly needed (Choi, Lee & Yoon, 2016). It is mainly stored in the database and various kinds of various services which are attached to this particular concept.

A false negative is situation in which a particular system fails to recognize an individual, which might lead to something which is not happening (Havenetidis et al., 2015). Depending on what there are many kinds of situation like personal in which owner of safe is prevented from accessing that particular safe. This ultimately leads to the fact that he or she cannot easily access a necessary kind of resources. So they ultimately need money which is there. On institutional level is seen that my entire sever infrastructure is shut down and the user needs to restore services. Then an organization may result in loosing of thousands of dollars of value in revenue (Wayman, 2015). And even after that biometric does not recognizes me then organization may result in losing of large number of money and along with reputation. In case of safety it is seen that a staff member of an organization has collapse of the floor due to cardiac arrest, then the biometric system may fail to recognize the particular person address person in problem and she or he can die before reaching that person.

When biometric is used as the main kind of authentication method for providing a large number of assets. It will ultimately hinder the assets. In many cases it is seen that fingerprint of a person is used for accessing the assets (Wayman, 2015). It is mainly done as a proof of something which is done by lawbreakers. It might result in punishing of a person who is not guilty.  Apart from various kinds of authentication and validation, biometric system is used for having notes regarding login and logout time. Biometrics can provide precise time of a person entering the premise of the assets. In many cases it can provide validation of time for entrance of a person to assets which is likely to fail in many cases (Wayman, 2015). It is considered to be similar to a security guard for a CCTV which might fail to provide information then biometrics can be considered to be effective for tackling that situation.

There are mainly two terms in biometric authentication that is false matching or false negative or false no match or false positive (Hadid et al, 2015). FM and FNM are considered to be application neutral terms which is used for describing the match process between live sample and biometric template. A false match generally occurs when the sample is incorrectly matched to a particular template in the database. While a false negative occurs when a sample is incorrectly matched with truly matching template in the database (Hadid et al, 2015). Various kinds of rates FM and FNM are generally calculate and is used for tradeoff between convenience and security.

References

Ali, A., & Afzal, M. M. (2017). Database Security: Threats and Solutions. International Journal of Engineering Inventions, 6(2), 25-27.

Alsaadi, I. M. (2015). Physiological Biometric Authentication Systems, Advantages, Disadvantages And Future Development: A Review. International Journal Of Scientific & Technology Research, 4(8), 285-289.

Bakar, N. A., Aminallah, A., Ab Rahim, S. S., Zam, N. M., Rahman, S. A., & Veerayangkur, V. (2018). EXAMINING THE RELATIONSHIP OF WEBSITE SECURITY, ONLINE PERCEIVED VALUE AND ONLINE PURCHASE INTENTION: EVIDENCES FROM MALAYSIA AND THAILAND ONLINE SHOPPING CONTEXT. Journal of Fundamental and Applied Sciences, 10(6S), 1176-1191.

Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S. M., Cranor, L. F., & Savvides, M. (2015). Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption. Proc. USEC, 1-2.

Choi, H. S., Lee, B., & Yoon, S. (2016). Biometric authentication using noisy electrocardiograms acquired by mobile sensors. IEEE Access, 4, 1266-1273.

Deokar, S. R., & Wakode, J. S. (2017). Coal Mine Safety Monitoring and Alerting System.

Dere, S. N., Gurjar, A. A., & Sipna, C. O. E. T. (2016). Human Identification Using Palm-Vein Images: A New Trend in Biometrics. International Journal of Engineering Science, 2298.

Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).

Fernandez, A., & Alexander, K. M. (2016). Data Privacy and Confidentiality. iURBAN: Intelligent Urban Energy Tool, 35.

Hadid, A., Evans, N., Marcel, S., & Fierrez, J. (2015). Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Processing Magazine, 32(5), 20-30.

Haque, M. A., Nasrollahi, K., & Moeslund, T. B. (2015, June). Heartbeat signal from facial video for biometric recognition. In Scandinavian Conference on Image Analysis (pp. 165-174). Springer, Cham.

Havenetidis, K., Paradisis, G. P., Karanasiou, I. S., & Tsekouras, G. J. (2015). An investigation of an Artificial Neural Network method for personal identification using kinematic parameters from specific body parts. Journal of Applied Mathematics and Bioinformatics, 5(3), 125.

He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), 816-823.

Holz, C., & Knaust, M. (2015, November). Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (pp. 303-312). ACM.

Jain, A. K., Nandakumar, K., & Ross, A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79, 80-105.

Jain, N., Jain, P., & Kapil, N. (2016). Enhanced data security model for cloud using ECC algorithm and third party auditor. Int. J. Adv. Res. Comput. Eng. Technol.(IJARCET), 5(3), 2278-1323.

Johnston, A. H., & Weiss, G. M. (2015, September). Smartwatch-based biometric gait recognition. In Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on (pp. 1-6). IEEE.

Kremic, E. (2017). The Biometric Model as Method of Protection from Cyber Frauds.

Lippi, G., Chiozza, L., Mattiuzzi, C., & Plebani, M. (2017). Patient and Sample Identification. Out of the Maze?. Journal of medical biochemistry, 36(2), 107-112.

Lumini, A., & Nanni, L. (2017). Overview of the combination of biometric matchers. Information Fusion, 33, 71-85.

Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602.

Onuchowska, A., & de Vreede, G. J. (2018, January). Disruption and Deception in Crowdsourcing: Towards a Crowdsourcing Risk Framework. In Proceedings of the 51st Hawaii International Conference on System Sciences.

Pagnin, E., & Mitrokotsa, A. (2017). Privacy-preserving biometric authentication: challenges and directions. Security and Communication Networks, 2017.

Qizi, S. M. C. (2015). The Role of Biometric Networks in Recognition of Person. Communications, 3(5), 81-85.

Russell, N., & Chow, M. (2017). Cybersecurity and Our Food Systems.

Sagar, G. V., Barker, S. Y., Raja, K. B., Babu, K. S., & Venugopal, K. R. (2015, December). Convolution based Face Recognition using DWT and feature vector compression. In Image Information Processing (ICIIP), 2015 Third International Conference on (pp. 444-449). IEEE.

Shubhangi, S., Namrata, S., Manisha, G., & Scholar, U. G. (2016). Liveness Detection for Biometric System Using IQA. International Journal of Engineering Science, 5010.

Wayman, J., Jain, A., Maltoni, D., & Maio, D. (2015). An introduction to biometric authentication systems. In Biometric Systems (pp. 1-20). Springer London.

MyAssignmenthelp.co.uk is a name in assignment writing services that students trust. We offer our assignment writing services for a wide variety of assignment including essays, dissertations, case studies and more. Students can place their order with us anytime as we function 24x7, and get their copies at unbeatable prices. We guarantee that all of our solutions are plagiarism-free.

Why Student Prefer Us ?
Top quality papers

We do not compromise when it comes to maintaining high quality that our customers expect from us. Our quality assurance team keeps an eye on this matter.

100% affordable

We are the only company in UK which offers qualitative and custom assignment writing services at low prices. Our charges will not burn your pocket.

Timely delivery

We never delay to deliver the assignments. We are very particular about this. We assure that you will receive your paper on the promised date.

Round the clock support

We assure 24/7 live support. Our customer care executives remain always online. You can call us anytime. We will resolve your issues as early as possible.

Privacy guaranteed

We assure 100% confidentiality of all your personal details. We will not share your information. You can visit our privacy policy page for more details.

Upload your Assignment and improve Your Grade

Boost Grades