15 Aug 2022

147

Technical Security Services

Format: APA

Academic level: College

Paper type: Coursework

Words: 309

Pages: 1

Downloads: 0

The importance of the security access control (SAC) cannot be underestimated as the world software, and computer security is at its alarming stage. SAC is the process which ensures that the system authenticated users only access what is important and what is stipulated for them to access and they don’t interfere with other information which they should not be accessing (Haghighat et al., 2015). Most of the devices which are used are inclusive of biometric identification machines which either use eye, fingerprints and other parts of the body to identify the authentic individual. This system has advantages over old methods such the use of a password. 

Firstly, these devices unlike the password, cannot be copied or vandalized, forgotten or changed by the unauthorized individual. They used the personal body part identification systems such as the fingerprints, eye and many others to identify an individual. These devices cannot be replicated or replaced or changed by an individual who has a bad intention to vandalized data. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Consequently, these devices are very friendly and easier to use and are efficient with minimum training. For instance, the verification time is minimal and reduces frustration; they are always very accurate when being used and provide minimal chances of confusion. Also, they identify authorization without documents which, may get lost or stolen. 

Last, these devices provide maximum data security. Data and information should be secured and protected for future reference when they are needed. However human being is the number one enemy of such data. Without proper security and data protection, it is very easy for an individual who has bad intention to either delete or destroy or simply change the password of the computer to hide data. This is especially possible in the justice system where evidence is very critical. A criminal may rely on an individual who works for the justice system and vandalize evidence if not well protected. SAC ensures that such cases are minimized since even one works for an organization; they can only access data which are important to them (Haghighat et al., 2015). 

Reference  

Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2015). CloudID: Trustworthy cloud-based and cross-enterprise biometric identification. Expert Systems with Applications , 42 (21), 7905-7916. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Technical Security Services.
https://studybounty.com/technical-security-services-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Vaccine Choice Canada Interest Group

Vaccine Choice Canada Interest Group Brief description of the group Vaccine Choice Canada, VCC, denotes Canada's leading anti-vaccination group. Initially, the anti-vaccination group was regarded as Vaccination...

Words: 588

Pages: 2

Views: 145

Regulation for Nursing Practice Staff Development Meeting

Describe the differences between a board of nursing and a professional nurse association. A board of nursing (BON) refers to a professional organization tasked with the responsibility of representing nurses in...

Words: 809

Pages: 3

Views: 190

Moral and Ethical Decision Making

Moral and Ethical Decision Making Healthcare is one of the institutions where technology had taken lead. With the emerging different kinds of diseases, technology had been put on the frontline to curb some of the...

Words: 576

Pages: 2

Views: 88

COVID-19 and Ethical Dilemmas on Nurses

Nurses are key players in the health care sector of a nation. They provide care and information to patients and occupy leadership positions in the health systems, hospitals, and other related organizations. However,...

Words: 1274

Pages: 5

Views: 77

Health Insurance and Reimbursement

There are as many as 5000 hospitals in the United States equipped to meet the health needs of a diversified population whenever they arise. The majority of the facilities offer medical and surgical care for...

Words: 1239

Pages: 4

Views: 438

Preventing Postoperative Wound Infections

Tesla Inc. is an American based multinational company dealing with clean energy and electric vehicles to transition the world into exploiting sustainable energy. The dream of developing an electric car was...

Words: 522

Pages: 5

Views: 356

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration