Biometric computer security systems, Biology

Assignment Help:

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.


Related Discussions:- Biometric computer security systems

How different are fecundation in osteichthyes, How different are fecundatio...

How different are fecundation in osteichthyes and in chondrichthyes? In chondrichthyes fecundation is internal by means of copulation. In osteichthyes fecundation generally is

Transcription and processing of trna in prokaryotes , The rRNA transcriptio...

The rRNA transcription units in E. coli hold some tRNA genes which are processed and transcribed at the time of rRNA transcription. The other tRNA genes  happen  in  clusters  of

Who is known as father of english botany, Who is known as Father of English...

Who is known as Father of English Botany? William Turner (1515-1568), whose 'A New Herbal' printed in English appeared in 1551 (first part), 1562 (second part) and 1568 (third

Define mechanism of rotary instrument fracture, Define Mechanism of Rotary ...

Define Mechanism of Rotary Instrument Fracture - Cyclic Fatigue Occurs unexpectedly and without any visible signs of plastic deformation o An instrument rotating freely in a cu

What are target organs of the hormones, What are target organs of the hormo...

What are target organs of the hormones? Target organs, target tissues and target cells are those exact organs, tissues and cells upon which each hormone acts and makes its effe

Describe the organization of the vascular plant body, Describe the Organiza...

Describe the Organization of the Vascular Plant Body? A typical plant body consists of two distinct systems: a root system and a shoot system. The root system is usually below

What is the basic need for bone grafting, What is the basic need for bone g...

What is the basic need for bone grafting The basic need for bone grafting includes situations like: 1. Implant site development- when the quantity of bone is deficient to s

Excretory organs, why the excretory organ of prawn is called ''green gland'...

why the excretory organ of prawn is called ''green gland''?

What is intracardiac repair of tetralogy of fallot, What is Intracardiac Re...

What is Intracardiac Repair of Tetralogy of Fallot ? Technique : The essential steps are: (I) relief of right ventricular outflow obstruction, and (2) closure of ventricular

Virus is in an inactive state, Q. What is signifying when it is said that a...

Q. What is signifying when it is said that a virus is in an inactive state? Viruses considered in inactive state are those whose genetic material is within host cells without a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd