Biometric computer security systems, Biology

Assignment Help:

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.


Related Discussions:- Biometric computer security systems

Definition of diabetes mellitus, Q. DEFINITION OF DIABETES MELLITUS? Th...

Q. DEFINITION OF DIABETES MELLITUS? The word "diabetes" is derived from the Greek word meaning "a siphon". The patients of diabetes had polyuria (passing excessive urine) and "

Syringe, Can you use a regular syringe instead of a gas syringe in a lab

Can you use a regular syringe instead of a gas syringe in a lab

Mammalian lungs - respiration, Mammalian Lungs - Respiration In this w...

Mammalian Lungs - Respiration In this we will study mainly mammalian lungs as it is the best representative of a respiratory surface adapted for terrestrial respiration. For t

Is glucose can be oxidized to two primary products, In the RBC, glucose can...

In the RBC, glucose can be oxidized to two primary products. One of the oxidation proucts is ribulose 5 phosphate, and the other is which of the following compounds? -lactate

What are the bone grafting issues, Bone grafting issues Planning of the...

Bone grafting issues Planning of the case is very critical. Any bone defect in the aesthetic zone should be evaluated prior to implant placement in order to obtain a prosthetic

Optical rotation in organice compounds, how the optical rotaion occurs in g...

how the optical rotaion occurs in glucose and ribose?

What would be the knowledge of regeneration, A 19 year old model for Glamou...

A 19 year old model for Glamour magazine tripped over an extension cord causing injury to her epidermis. She is afraid the injury will leave a scar. Based on your knowledge of rege

What is the radiographic evaluation, Radiographic Evaluation An intraor...

Radiographic Evaluation An intraoral periapical radiograph with a paralleling technique should be made and observed to ensure absence of pathology in the peri-implant region an

she kept forgetting her appointment with the dentist, Listed below are exa...

Listed below are examples of behaviors that typify a defense mechanism at work. For each example choose the correct defense mechanism and explain the reason for your choice. 1. J

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd