Biometric computer security systems, Biology

Assignment Help:

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.


Related Discussions:- Biometric computer security systems

Explain the periapical surgery - endodontic surgery, Explain the Periapical...

Explain the Periapical surgery - Endodontic Surgery a) Curretage 1 b) Root-end ressection 2 c) Root-end preparation 3 d) Root-end filling 4

Define glycogen , A glycogen molecule having entirely of glucose uni...

A glycogen molecule having entirely of glucose units, many of that are linked in long chains through α1-4 bonds.  Furthermore,  every  10  units  or  so,  the  chain  is branched

Cell biology, what is morphological diversity of prokaryotes ans eukaryotes...

what is morphological diversity of prokaryotes ans eukaryotes

Cellular type - endosperm, Cellular Type - Endosperm In this type, as...

Cellular Type - Endosperm In this type, as the name indicates, the division of the primary endosperm nucleus is immediately followed by the laying down of a wall, which is us

Contractile cells, CONTRACTI L E CELLS In addition to above mentioned...

CONTRACTI L E CELLS In addition to above mentioned three types of muscular tissue, there are contractile cells. These are as follows. 1.      Myoepithelial Cells (= M

Determine protein needs during pregnancy period, Determine Protein needs du...

Determine Protein needs during pregnancy period? Altogether, 925 g of protein are deposited in a normal foetus and maternal accessory tissues and considering the dietary protei

Motor control in annelids and arthropods, Motor Control in Annelids and Art...

Motor Control in Annelids and Arthropods In annelids and arthropods generally, individual metameric ganglia of the ventral nerve cord are capable of initiating and keep locomo

Peste des petits ruminants (ppr), Peste des petits ruminants (PPR) is an a...

Peste des petits ruminants (PPR) is an acute, highly contagious viral disease of goats and sheep caused by peste des petits ruminants (PPR) virus which belongs to the genus Morbil

Productive use values, Productive use values This is the value of natu...

Productive use values This is the value of natural products harvested through commercial logging, agriculture or fisheries and medicines that generated products that are of co

Secondary egg envelopes, Secondary Egg Envelopes These are secreted b...

Secondary Egg Envelopes These are secreted by oviducts and other accessory parts of genital organs while the egg is passing through them from ovary to the exterior. a) In

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd