Biometric computer security systems, Biology

Assignment Help:

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.


Related Discussions:- Biometric computer security systems

Explain about the waist to hip ratio (whr), Explain about the Waist to Hip ...

Explain about the Waist to Hip Ratio (WHR)? Two individuals who have the same BMI and the same total body fat may have different abdominal fat mass. Abdominal fat accumulation

Osmosis, Consider 100 ml of 10% solute and 10 ml of 50& solute. Which has t...

Consider 100 ml of 10% solute and 10 ml of 50& solute. Which has the greatest concentration of solute? What is the concentration of solute? Which has a greater quantity of solute?

Determine the categories of sleep disorders, Determine the categories of sl...

Determine the categories of sleep disorders Sleep disorders are generally divided into two major groups: 1) Narcolepsy, which is characterised by excessive sleep or brief in

The trp operon, The trp (tryptophan) operon which is shown in the figure wi...

The trp (tryptophan) operon which is shown in the figure will have  five  structural  genes  encoding enzymes  for tryptophan  biosynthesis  with an upstream  Ptrp  (trp promoter)

Determine the term - vascular disorders, Determine the term - Vascular diso...

Determine the term - Vascular disorders Normal central nervous system functioning can be affected by a number of vascular problems, because blood-vessel disease or damage can g

Patterns & Mechanisms of Evolution, What types of individuals in a populati...

What types of individuals in a population are represented by the two ends of a bell curve?

Describe about transposition of the great arteries, Describe about Transpos...

Describe about Transposition of the Great Arteries ? Abnormal origin of the great artesies from the ventricular complex. Pulmonary Artery arises from the morphological left ven

Systematics, three types of evidence used by systematic taxonomists

three types of evidence used by systematic taxonomists

Taxonomy, A In taxonomy, what is a "KEY" ? List the different types of key...

A In taxonomy, what is a "KEY" ? List the different types of keys. How are they prepared and what are they used for ?sk question #Minimum 100 words accepted#

What is kingdom protista in diversity of life, What is Kingdom Protista in ...

What is Kingdom Protista in diversity of life? Members of Kingdom Protista are grouped separately from the other eukaryotic kingdoms because most of the organisms have a unicel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd