Authorizing computer users. At high-technology industries,

Chapter 7, Problem 16E

(choose chapter or problem)

Get Unlimited Answers
QUESTION:

Authorizing computer users. At high-technology industries, computer security is achieved by using a password—a collection of symbols (usually letters and numbers) that must be supplied by the user before the computer permits access to the account. The problem is that persistent hackers can create programs that enter millions of combinations of symbols into a target system until the correct password is found. The newest systems solve this problem by requiring authorized users to identify themselves by unique body characteristics. For example, a system developed by Palmguard, Inc. tests the hypothesis

\(H_0\): The proposed user is authorized

\(H_a\): The proposed user is unauthorized

by checking characteristics of the proposed user’s palm against those stored in the authorized users’ data bank.

a. Define a Type I error and Type II error for this test. Which is the more serious error? Why?

b. Palmguard reports that the Type I error rate for its system is less than 1%, whereas the Type II error rate is .00025%. Interpret these error rates.

c. Another successful security system, the EyeDentifyer, “spots authorized computer users by reading the one-of-a-kind patterns formed by the network of minute blood vessels across the retina at the back of the eye.” The EyeDentifyer reports Type I and II error rates of .01% (1 in 10,000) and .005% (5 in 100,000), respectively. Interpret these rates.

Questions & Answers

QUESTION:

Authorizing computer users. At high-technology industries, computer security is achieved by using a password—a collection of symbols (usually letters and numbers) that must be supplied by the user before the computer permits access to the account. The problem is that persistent hackers can create programs that enter millions of combinations of symbols into a target system until the correct password is found. The newest systems solve this problem by requiring authorized users to identify themselves by unique body characteristics. For example, a system developed by Palmguard, Inc. tests the hypothesis

\(H_0\): The proposed user is authorized

\(H_a\): The proposed user is unauthorized

by checking characteristics of the proposed user’s palm against those stored in the authorized users’ data bank.

a. Define a Type I error and Type II error for this test. Which is the more serious error? Why?

b. Palmguard reports that the Type I error rate for its system is less than 1%, whereas the Type II error rate is .00025%. Interpret these error rates.

c. Another successful security system, the EyeDentifyer, “spots authorized computer users by reading the one-of-a-kind patterns formed by the network of minute blood vessels across the retina at the back of the eye.” The EyeDentifyer reports Type I and II error rates of .01% (1 in 10,000) and .005% (5 in 100,000), respectively. Interpret these rates.

ANSWER:

Step 1 of 5

a) We have to describe the population of interest

The population of interest is women who shop on black friday in the US  

Add to cart


Study Tools You Might Need

Not The Solution You Need? Search for Your Answer Here:

×

Login

Login or Sign up for access to all of our study tools and educational content!

Forgot password?
Register Now

×

Register

Sign up for access to all content on our site!

Or login if you already have an account

×

Reset password

If you have an active account we’ll send you an e-mail for password recovery

Or login if you have your password back