Conduct research on a technical (information systems related) topic of your choice. Task 1: Find a...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Conduct research on a technical (information systems related) topic of your choice. Task 1: Find a tech topic (should be information technology/information systems related) that you think is interesting and relevant for the class! 2. Task 2: As you conduct your research on the topic, you will find useful articles, videos, websites that provide valuable source material. a. Provide us with at least 2 references (typically website research, but it can be traditional print material). Use a standard citation format. b. Find an image that you think will go along well with your write up. Tell us why you felt this image was relevant. c. Also tell us where you found the image (the website / URL) d. Share with us at least 1 link to a video related to the tech topic. The video should be from YouTube or Vimeo. 3. Task 3: Write a 1-2-page summary of your tech talk using the supplied template document (12-point font, single-spaced, 1" margins). Include in your write-up: a. Why did you choose this topic including why is it important and relevant? b. List the important points about the topic. Use bullet points when appropriate. My Tech Talk Topic: Hacking Fingerprint Scanners! Authentication is an important topic that has gained significant attention in the past couple of years. There are three common factors used to authenticate with a device or service (Valacich and Schneider, 2016). These include: 1. What you know (e.g., a password) 2. What you have (e.g., a token, key card) 3. What you are (e.g., fingerprint, retina scan) We have always had usernames and passwords (authentication method #1 above), but other factors of authentication have recently gained popularity because of advancements in technology. Also, passwords have gained a lot of negative attention because all of the problems we have heard about with passwords being stolen. For example, one can easily search the web for information about stolen passwords on LinkedIn, Sony, Zappos, Adobe, etc., the list goes on and on. Unfortunately, when a username and password list are stolen, it takes very little time and effort to match passwords-including those that are encrypted-with their unencrypted counterparts. In other words, it is my opinion that passwords may be nearing the maximum of their usefulness, at least in their current incarnation. http://www.bitcuantico.com/2014/12/05/symantec- soluciones-en-seguridad-para-smartphones/ Now, let's take the password problem and apply it to a piece of technology many of us use every all (Fidelman, 2012)! The percentage is probably worse for more casual consumers. Why are so many of us too lazy to implement-at the minimum-a simple passcode? The short answer is convenience. So, to deal with this problem and to improve convenience, firms like Apple have implemented fingerprint scanners into their smartphones (Apple 2015). With a fingerprint scanner, a user can very quickly authenticate against their phone (using something you are), and gain access to the secured contents of the phone. It takes minimal effort to do so, and the contents are now secured. But are they? Many would put forth the argument that something is better than nothing. But take a quick look at the screen on your phone. What do you use to navigate your phone? Your finger! In other words, you secure your phone (with perhaps) the same finger that you use to navigate your phone. Doing so leaves your fingerprints behind, so any physical access to the phone can result in a lifted fingerprint, and ultimately an unlocked phone! However, don't just believe me- experienced techies were able to hack the TouchID sensor in less than 24 hours after the iPhone 5S release (Starbug 2013). Starbug Touch ID Making dummy print from wood glue Watch later Share Watch on YouTube Now, Apple was one of the first firms to gain notoriety regarding fingerprint scanning, but it would be foolish to believe that any of their competitors are any safer. So what does this mean for you? Use some kind of security-something is better than nothing! Whether you use passcodes, patterns, or fingerprints, it does not matter. Please just don't use slide to unlock! Of course, a powerful way to address the problem is by combining factors, often known as two- factor authentication. However, we'll save that topic for another day... List of References: 1. Apple, "About Touch ID security on iPhone and iPad," Apple Support, May 5, 2015. (https://support.apple.com/en-us/HT5949). 2. Fidelman, M. "The Latest Infographics: Mobile Business Statistics For 2012," Forbes, May 2, (http://www.forbes.com/sites/markfidelman/2012/05/02/the-latest-infographics- 2012. . mobile-business-statistics-for-2012/) 3. "Starbug's Touch ID Attack," YouTube, Sept. 25, 2013. (https://youtu.be/DJvgiMX1pv4). 4. Valacich, J., and Schneider, C. "Information Systems Today: Managing in the Digital World (CH10: Securing Information Systems)," 7th Edition. Pearson Education, 2016. Advorticomontr Conduct research on a technical (information systems related) topic of your choice. Task 1: Find a tech topic (should be information technology/information systems related) that you think is interesting and relevant for the class! 2. Task 2: As you conduct your research on the topic, you will find useful articles, videos, websites that provide valuable source material. a. Provide us with at least 2 references (typically website research, but it can be traditional print material). Use a standard citation format. b. Find an image that you think will go along well with your write up. Tell us why you felt this image was relevant. c. Also tell us where you found the image (the website / URL) d. Share with us at least 1 link to a video related to the tech topic. The video should be from YouTube or Vimeo. 3. Task 3: Write a 1-2-page summary of your tech talk using the supplied template document (12-point font, single-spaced, 1" margins). Include in your write-up: a. Why did you choose this topic including why is it important and relevant? b. List the important points about the topic. Use bullet points when appropriate. My Tech Talk Topic: Hacking Fingerprint Scanners! Authentication is an important topic that has gained significant attention in the past couple of years. There are three common factors used to authenticate with a device or service (Valacich and Schneider, 2016). These include: 1. What you know (e.g., a password) 2. What you have (e.g., a token, key card) 3. What you are (e.g., fingerprint, retina scan) We have always had usernames and passwords (authentication method #1 above), but other factors of authentication have recently gained popularity because of advancements in technology. Also, passwords have gained a lot of negative attention because all of the problems we have heard about with passwords being stolen. For example, one can easily search the web for information about stolen passwords on LinkedIn, Sony, Zappos, Adobe, etc., the list goes on and on. Unfortunately, when a username and password list are stolen, it takes very little time and effort to match passwords-including those that are encrypted-with their unencrypted counterparts. In other words, it is my opinion that passwords may be nearing the maximum of their usefulness, at least in their current incarnation. http://www.bitcuantico.com/2014/12/05/symantec- soluciones-en-seguridad-para-smartphones/ Now, let's take the password problem and apply it to a piece of technology many of us use every all (Fidelman, 2012)! The percentage is probably worse for more casual consumers. Why are so many of us too lazy to implement-at the minimum-a simple passcode? The short answer is convenience. So, to deal with this problem and to improve convenience, firms like Apple have implemented fingerprint scanners into their smartphones (Apple 2015). With a fingerprint scanner, a user can very quickly authenticate against their phone (using something you are), and gain access to the secured contents of the phone. It takes minimal effort to do so, and the contents are now secured. But are they? Many would put forth the argument that something is better than nothing. But take a quick look at the screen on your phone. What do you use to navigate your phone? Your finger! In other words, you secure your phone (with perhaps) the same finger that you use to navigate your phone. Doing so leaves your fingerprints behind, so any physical access to the phone can result in a lifted fingerprint, and ultimately an unlocked phone! However, don't just believe me- experienced techies were able to hack the TouchID sensor in less than 24 hours after the iPhone 5S release (Starbug 2013). Starbug Touch ID Making dummy print from wood glue Watch later Share Watch on YouTube Now, Apple was one of the first firms to gain notoriety regarding fingerprint scanning, but it would be foolish to believe that any of their competitors are any safer. So what does this mean for you? Use some kind of security-something is better than nothing! Whether you use passcodes, patterns, or fingerprints, it does not matter. Please just don't use slide to unlock! Of course, a powerful way to address the problem is by combining factors, often known as two- factor authentication. However, we'll save that topic for another day... List of References: 1. Apple, "About Touch ID security on iPhone and iPad," Apple Support, May 5, 2015. (https://support.apple.com/en-us/HT5949). 2. Fidelman, M. "The Latest Infographics: Mobile Business Statistics For 2012," Forbes, May 2, (http://www.forbes.com/sites/markfidelman/2012/05/02/the-latest-infographics- 2012. . mobile-business-statistics-for-2012/) 3. "Starbug's Touch ID Attack," YouTube, Sept. 25, 2013. (https://youtu.be/DJvgiMX1pv4). 4. Valacich, J., and Schneider, C. "Information Systems Today: Managing in the Digital World (CH10: Securing Information Systems)," 7th Edition. Pearson Education, 2016. Advorticomontr
Expert Answer:
Related Book For
Statistics The Art And Science Of Learning From Data
ISBN: 9780321755940
3rd Edition
Authors: Alan Agresti, Christine A. Franklin
Posted Date:
Students also viewed these algorithms questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Case Study: Quick Fix Dental Practice Technology requirements Application must be built using Visual Studio 2019 or Visual Studio 2017, professional or enterprise. The community edition is not...
-
According to the Internal Revenue Service (IRS), the chances of your tax return being audited are about 1 in 100 if your income is less than $1 million and 9 in 100 if your income is $1 million or...
-
Which of the personal and contextual factors influenced Lori Miller, Elizabeth Gray, Frank Gastner, and Monique Huston's choice of a dream job?
-
(a) Find the equivalent capacitance of the capacitors in figure.(b) Find the charge on each capacitor and the potential difference acrossit. 4.00 F 3.00 F 2.00 F 12.0 V
-
Because of friction, a \(0.10-\mathrm{kg}\) hockey puck initially sliding over ice at \(8.0 \mathrm{~m} / \mathrm{s}\) slows down at a constant rate of \(1.0 \mathrm{~m} / \mathrm{s}^{2}\) until it...
-
Drew Castello, general manager of Sunflower Manufacturing, was frustrated. He wanted the budgeted results, and his staff was not getting them to him fast enough. Drew decided to pay a visit to the...
-
(a) (b) (c) Small business owners are discovering that social media marketing is quickly becoming an important method for driving business growth. While the idea of using "free tools" to drive...
-
1). (In this problem, give all of the answers correct to one decimal place.) A scientist is growing bacteria in her lab. She finds that the number of bacteria per microliter in her sample can be...
-
a. Match the terms (identified as a through g) with the definitions and phrases. For example, the term "a. Assets" matches with definition, "Economic resources that will be used by a business to...
-
Corrosion of metals in aerated aqueous environments involves the following cathodic reaction: (i) O2(aq) + 2H2O(l) +4e- 40H(aq) E = +0.401 V Calculate the equilibrium constant for the above cathodic...
-
9. What is(are) the output(s) of the following code fragment? string str1("Cat"), str2("Rat"), str3("Bat"), str4, str5, str6; str4 str1+str2; if(str1==str3) str5=str1; else str5=str2+str1;...
-
Design a Tips class that calculates the gratuity on a restaurant meal. Its only class member variable, taxRate, should be set by a one-parameter constructor to whatever rate is passed to it when a...
-
(a) List THREE ways energy is stored in pure graphite. (b) Explain why heat capacity at constant pressure, Cp, is always higher than the heat capacity at constant volume, Cv. (c) Write out a...
-
Macon was a fifty-year-old company in the business of developing test equipment for the tire industry. The company had a history of segregated departments with very focused functional line managers....
-
Record the following selected transactions for March in a two-column journal, identifying each entry by letter: (a) Received $10,000 from Shirley Knowles, owner. (b) Purchased equipment for $35,000,...
-
For events A, B, and C such that each pair of events is disjoint, use a Venn diagram to explain why P(A or B or C) = P(A) + P(B) + P(C).
-
Consider a Pick-3 lottery such as the one described in Exercise 6.6. Suppose your birthday is May 14, and like many people, you decide to bet $1 on your birthday number (i.e., 514) on your birthday....
-
The table shows the probability distribution of the number of bases for a randomly selected time at bat for a San Francisco Giants player in 2010 (excluding times when the player got on base because...
-
Company data for dividend per share (DPS), earnings per share (EPS), share price, and price-to-earnings ratio (P/E) for the most recent five years are presented in Exhibit 10-9. In addition,...
-
The best model to use when valuing a young dividend-paying company that is just entering the growth phase is most likely the: A. Gordon growth model. B. Two-stage dividend discount model. C....
-
1. An analyst is estimating the intrinsic value of a new company. The analyst has one year of financial statements for the company and has calculated the average values of a variety of price...
Study smarter with the SolutionInn App