Role of biometric devices in security

  Biometric devices measure biological Elements (like human features) in order to perform functions, such as logging Health/fitness data and authenticating users. There are many different uses for the technology and a variety of methods for its implementation. Types of biometric data include visual, audio, spatial and behavioral. According to these characteristics, the sub-divided groups … Read more

Vulnerable (VU)

The following are the subtopics of Vulnerable (VU): VU#1: Insufficient Access Control VU#2: Information Exposure VU#3: Injection VU#4: Insecure Design VU#5: Insecure Configuration Management VU#6: Insecure Deserialization VU#7: Insecure Input Validation VU#8: Insecure Storage VU#9: Insufficient Logging and Monitoring VU#10: Privilege Escalation VU#11: Remote Code Execution VU#12: Session Management VU#13: Software and Configuration Management VU#14: … Read more