Evaluate the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics.

Justify the use of biometric technology with support for implementation.
August 20, 2019
Discuss the Applications of Biometrics.
August 20, 2019

Evaluate the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics.

Question Description

  • Refer to the Mega-Corp Case Study found in the Resources under the heading, Capella Resources, as well as the additional case study background below, as the context in which to complete this part of the assessment.You have been tasked with evaluating existing biometric products and making a recommendation to the board as to how biometrics will fit with the authentication strategy for the organization.

    DELIVERABLE 

    Write a 6–8 page evaluation and recommendation in which you complete the following:

    • Evaluate the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics.
    • Identify the authentication options that are available through the use of various biometrics (for example, face, thumb, and palm).
    • Analyze the effectiveness of the various biometric options available for authentication.
    • Explore how the use of injected RFID relates to biometric vs token based options for authentication.
    • Describe the barriers to successful implementation of an enterprise level biometric authentication system.
    • Recommend a specific biometric authentication option.

    ADDITIONAL REQUIREMENTS

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to current APA style and formatting.
    • Length: 6–8 pages, excluding the references page.
    • Font: Times New Roman, 12 point.
Criteria Non-performance Basic Proficient Distinguished
Evaluate the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics.
Does not evaluate the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics. Evaluates incompletely or inaccurately the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics. Evaluates the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics. Evaluates the advantages and disadvantages of integrating physical and logical authentication procedures using biometrics including the use of supporting examples.
Identify the authentication options that are available through the use of various biometrics.
Does not identify the authentication options that are available through the use of various biometrics. Identifies incompletely or inaccurately the authentication options that are available through the use of various biometrics. Identifies the authentication options that are available through the use of various biometrics. Identifies the authentication options that are available through the use of various biometrics including the use of supporting examples.
Analyze the effectiveness of the various biometric options available for authentication.
Does not analyze effectiveness of the various biometric options available for authentication. Analyzes incompletely or inaccurately the effectiveness of the various biometric options available for authentication. Analyzes effectiveness of the various biometric options available for authentication. Analyzes of effectiveness of the various biometric options available for authentication including the use of supporting examples.
Explore how the use of injected RFID relates to biometric versus token-based options for authentication.
Does not explore how the use of injected RFID relates to biometric versus token-based options for authentication. Explores incompletely or inaccurately how the use of injected RFID relates to biometric versus token-based options for authentication. Explores how the use of injected RFID relates to biometric versus token-based options for authentication. Explores how the use of injected RFID relates to biometric versus token-based options for authentication including the use of supporting examples.
Describe the barriers to successful implementation of an enterprise-level biometric authentication system.
Does not describe the barriers to successful implementation of an enterprise-level biometric authentication system. Describes incompletely or inaccurately the barriers to successful implementation of an enterprise-level biometric authentication system. Describes the barriers to successful implementation of an enterprise-level biometric authentication system. Describes the barriers to successful implementation of an enterprise-level biometric authentication system including the use of supporting examples.
Recommend a specific biometric authentication option.
Does not recommend a specific biometric authentication option. Recommends incompletely or inaccurately a specific biometric authentication option. Recommends a specific biometric authentication option. Recommend a specific biometric authentication option including the use of supporting examples.