Tag: identification

  • People recognition

    Only days after Clearview hit the news, The Economist runs an article on how the Combating Terrorism Technical Support Office (CTTSO), an agency of the US defence department, has developed another dystopian tool to identify people by their heartbeat.

  • Risk assessment process

    • Threat identification is the review of technical and technical events that may damage a system
    • System characterization is the review of system and data criticality and sensitivity
    • Control analysis is the review of current and planned countermeasures against security requirements checklists.
    • Vulnerability identification is the review of system security procedures, design, implementation, or internal controls that may fail during attacks.