Write a 6–8 page evaluation and recommendation in which you complete the following:
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Evaluate the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics. |
Does not evaluate the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics. | Evaluates incompletely or inaccurately the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics. | Evaluates the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics. | Evaluates the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics including the use of supporting examples. |
Identify the authentication options that are available through the use of various biometrics. |
Does not identify the authentication options that are available through the use of various biometrics. | Identifies incompletely or inaccurately the authentication options that are available through the use of various biometrics. | Identifies the authentication options that are available through the use of various biometrics. | Identifies the authentication options that are available through the use of various biometrics including the use of supporting examples. |
Analyze the effectiveness of the various biometric options available for authentication. |
Does not analyze effectiveness of the various biometric options available for authentication. | Analyzes incompletely or inaccurately the effectiveness of the various biometric options available for authentication. | Analyzes effectiveness of the various biometric options available for authentication. | Analyzes of effectiveness of the various biometric options available for authentication including the use of supporting examples. |
Explore how the use of injected RFID relates to biometric versus token-based options for authentication. |
Does not explore how the use of injected RFID relates to biometric versus token-based options for authentication. | Explores incompletely or inaccurately how the use of injected RFID relates to biometric versus token-based options for authentication. | Explores how the use of injected RFID relates to biometric versus token-based options for authentication. | Explores how the use of injected RFID relates to biometric versus token-based options for authentication including the use of supporting examples. |
Describe the barriers to successful implementation of an enterprise-level biometric authentication system. |
Does not describe the barriers to successful implementation of an enterprise-level biometric authentication system. | Describes incompletely or inaccurately the barriers to successful implementation of an enterprise-level biometric authentication system. | Describes the barriers to successful implementation of an enterprise-level biometric authentication system. | Describes the barriers to successful implementation of an enterprise-level biometric authentication system including the use of supporting examples. |
Recommend a specific biometric authentication option. |
Does not recommend a specific biometric authentication option. | Recommends incompletely or inaccurately a specific biometric authentication option. | Recommends a specific biometric authentication option. | Recommend a specific biometric authentication option including the use of supporting examples. |