Task details and instructions:
Context You are working as security software developer at company a company in Northern Quarter, Manchester, e.g. Valtech that has a good experience of building security service software. You have a good experience of security services, access control, cryptography protocols, availability, and integrity but not authentication. Also you have a decent experience of software development using plan-driven and agile methods 6 or 7 years. This company is working to develop a mobile application for a bank’s users. The main security requirement of this mobile application is to provide the ability to authenticate users throughout the duration of an activity (randomly and continuously validate user). They noted that banking activities are susceptible to impersonation attacks and could benefit from the use of continuous biometric authentication. The company is aware that the literature showed that biometricbased authentication approaches have many advantages over traditional ones (e.g. passwords and PINs). The idea of biometricbased user authentication is “to authenticate legitimate users and identify impostors based on physiological and behavioral characteristics”. Authentication based on physiological biometrics include fingerprint, facial recognition, palm print, and iris. Authentication based on behavioral biometrics include voice, keystroke, and signature.
Get Free Quote!
332 Experts Online