E-Mail : support@onlinemathsguru.com
Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes. a) Research into the different types of bio-metric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages for the three types below. Give an example application when each type could be used: ] b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer. [ ] a) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN. [ ]. This assessment task will assess the following learning outcomes: For Part 2, you are recommended to write the answers in a word document and submit it via TURNITIN. Your answers to the questions should be precise but complete and informative. Each question should be answered individually with the corresponding label to indicate the tasks completed. Task-2 short answer questions should be precise but complete and informative and the number or words within 1500 -1800 words. Purchase the answer to view it