Biometric computer security systems, Biology

Assignment Help:

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.


Related Discussions:- Biometric computer security systems

Sociability - qualitative characters, Sociability (Gregariousness) Soc...

Sociability (Gregariousness) Sociability refers to the nature of grouping of individual plants, that is, whether they grow singly, in patches, in colonies or evenly intermixed

Describe fourth heart sound in details, Describe Fourth Heart Sound in deta...

Describe Fourth Heart Sound in details? S 4 is generated during the atrial-filling phase. It is a low frequency event. LVS, is best heard over apex. Mechanism of S 4 generat

Vasa diffrentia, VAS A DIFFRENTIA - Originate from wollfian duct ....

VAS A DIFFRENTIA - Originate from wollfian duct . It comes out fo cauda epdidymis enters into abdominal cavity through inguinal canal, forms loop round the uretor and j

Define energy requirements of infants, Define Energy requirements of infant...

Define Energy requirements of infants? Energy: Energy requirements of infants are based on the energy intake through breast milk by infants of well-nourished mothers. Based on

Which starch is being broken down by an enzyme, In an investigation to comp...

In an investigation to compare the rates at which starch is being broken down by an enzyme    (a) what test is used    (b) how do you know when the reaction

Differences between prokaryotic & eukaryotic cells, DIFFERENCES BETWEEN PRO...

DIFFERENCES BETWEEN PROKARYOTIC & EUKARYOTIC CELLS   S . N o .   CHA R AC T ERS   P R O K AR Y O T I C CELL

Define general protection in the laboratory, Define General protection in t...

Define General protection in the Laboratory? You are required to wear a laboratory coat at all times in the laboratory. It is sensible to buy one of good quality and to launder

What is genetic equilibrium, What is genetic equilibrium? The Genetic e...

What is genetic equilibrium? The Genetic equilibrium is the result of the Hardy-Weinberg law, a principle that affirms that under specific conditions the frequencies of the all

Define interactions between volatile substances and proteins, Define Intera...

Define Interactions between Volatile Substances and Proteins? Flavour binding may involve adsorption at the surface of food or penetration to the food interiority by diffusion

Explain risk assessment, Explain Risk Assessment Risk Assessment   :  ...

Explain Risk Assessment Risk Assessment   :  The scientific evaluation  of  known  or  potential adverse  health effects  resulting  from  human exposure to food borne hazards

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd