Biometrics: a tool for information security

THE PROBLEM of information security entails the protection of information elements (e.g., multimedia data) thereby ensuring that only authorized users are able to access the contents available in digital media. Content owners, such as authors and authorized distributors, are losing billions of dollars annually in revenue due to the illegal copying and sharing of digital media. In order to address this growing problem, digital rights management (DRM) systems are being deployed to regulate the duplication and dissemination of digital content [68]. The critical component of a DRM system is user authentication which determines whether a certain individual is indeed authorized to access the content available in a particular digital medium. In a generic cryptographic system, the user authentication method is possession based. That is, the possession of the decrypting key is sufficient to establish the authenticity.

Spotlight

SteelCloud LLC

SteelCloud develops STIG & CIS policy remediation solutions for DoD/government & commercial customers. ConfigOS is a patented STIG/CIS policy remediation tool for managing secure baselines and implementing/maintaining STIG/CIS-compliant environments. Unlike simple scanning and reporting tools, ConfigOS actually fixes/remediates STIG/CIS controls. ConfigOS allows customers to harden controls around an application environment in less than 60 minutes - versus days/weeks/months. ConfigOS can scan 3,000 to 5,000 Windows or Linux endpoints per hour and can remediation 1,000 to -3,000 endpoints per hour – per instance of ConfigOS. Comprehensive compliance reporting and XCCDF output are automatically produced.

OTHER WHITEPAPERS
news image

Cybersecurity Technologies for Cloud Access

whitePaper | September 14, 2022

The enterprises’ network and network security architectures are unable to effectively serve the dynamic secure access requirements of digital business. The enterprise data center is no longer the center of access requirements for users and devices.

Read More
news image

Securing Today's Convenience Stores with Fortinet

whitePaper | June 14, 2023

Today’s convenience stores (C-Stores) rely on a variety of digital tools to support an evolving retail engagement model that includes everything within the store interior and the forecourt. This can involve point-of-sale (POS) infrastructure, self-service kiosks, intelligent building systems, digital signage, fuel dispensers, guest Wi-Fi, security cameras, loyalty system integration, and store-in-store services. Plus, today’s stores contain a wide array of Internet-of-Things (IoT) devices, such as walk-in cooler sensors and occupancy sensors. Protecting these critical systems against cyberthreats is paramount for compliance and maintenaning brand value.

Read More
news image

Cyber Security State of Tech in 2022

whitePaper | August 4, 2022

The Coronavirus pandemic accelerated technology adoption in ways thought unimaginable just a few short years ago. But in the background and often without much fanfare, cybercrime grew far worse. Threat actors continued their work – often backed by millions of dollars from hostile foreign governments – to penetrate networks and wreak havoc on digital infrastructures

Read More
news image

The State of Zero Trust Security 2022

whitePaper | September 27, 2022

The philosophy of Zero Trust security—“never trust; always verify”—has certainly struck a chord. It took decades for organizations to move past the basic castle andmoat security mindset, and to accept that in a cloud world, there is no perimeter to defend, and intruders are always on our networks.

Read More
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More
news image

Building the next generation of security and privacy professionals

whitePaper | October 4, 2022

Organizational practices in the digital age are inevitably linked to the processing of data, and built upon the systems that support these efforts. Collectively, cybersecurity and privacy professionals are responsible for guiding and implementing organizational decisions that ensure data is collected, processed, protected and shared consistent with evolving norms.

Read More

Spotlight

SteelCloud LLC

SteelCloud develops STIG & CIS policy remediation solutions for DoD/government & commercial customers. ConfigOS is a patented STIG/CIS policy remediation tool for managing secure baselines and implementing/maintaining STIG/CIS-compliant environments. Unlike simple scanning and reporting tools, ConfigOS actually fixes/remediates STIG/CIS controls. ConfigOS allows customers to harden controls around an application environment in less than 60 minutes - versus days/weeks/months. ConfigOS can scan 3,000 to 5,000 Windows or Linux endpoints per hour and can remediation 1,000 to -3,000 endpoints per hour – per instance of ConfigOS. Comprehensive compliance reporting and XCCDF output are automatically produced.

Events