Biometric computer security systems, Biology

Assignment Help:

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.


Related Discussions:- Biometric computer security systems

Zoonoses disease-plague, Plague Plague is an acute and highly fatal di...

Plague Plague is an acute and highly fatal disease caused by Yersinia pestis and transmitted by the bite of infected rat fleas. It is primarily a disease of rodents and small

Male reproductive system - urethera, URETHRA - It is common duct as ...

URETHRA - It is common duct as sperms & urine both pass from it. It receives juices of prostatic gland & cowper's gland. Urethra is 20 cm long, passes through the peni

Determine the general principles for incisions, General Principles for Inci...

General Principles for Incisions The general principles for placing incisions so as to create surgical flaps remain the same regardless of the reason for creating them. These a

Determine the closed-loop negative feedback system, Which of the following ...

Which of the following is a situation in which a closed-loop negative feedback system is converted to an open-loop system?  A disease that destroys all the A. V2 Receptors in a

Explain membrane filtration technique, Explain Membrane Filtration Techniqu...

Explain Membrane Filtration Technique? Another method used for determining the bacterial number is the filtration technique. The margain figure illustrates the membrane filter

Show symptoms of dyspepsia, Q. Show Symptoms of Dyspepsia? The symptoms...

Q. Show Symptoms of Dyspepsia? The symptoms are heartburn, upper abdominal discomfort (often food-related) indigestion, bloating, fullness, nausea and anorexia. Such symptoms c

Define the effects of deficiency of calcium in the body, Define the effects...

Define the effects of Deficiency of Calcium in the Body? If there is a continued inadequate intake or poor intestinal absorption of calcium, plasma calcium concentrations will

Material basis of primitive life, Material Basis of Primitive Life: In ...

Material Basis of Primitive Life: In  the primitive society, human beings invented tools for catching animals, and for collecting, transporting and even preparing food.  They l

Intermediate and the definitive hosts of the plasmodium, Q. What are the in...

Q. What are the intermediate and the definitive hosts of the plasmodium? In the life-cycle of the plasmodium humans are the intermediate hosts (where asexual reproduction takes

Define the open loop system, Situation in which a closed loop negative feed...

Situation in which a closed loop negative feedback system is  converted to an open loop system?     A.  A disease that destroys all the adenylyl cyclase and all the cAMP in the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd