Biometric computer security systems, Biology

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.

Posted Date: 4/2/2013 2:43:04 AM | Location : United States







Related Discussions:- Biometric computer security systems, Assignment Help, Ask Question on Biometric computer security systems, Get Answer, Expert's Help, Biometric computer security systems Discussions

Write discussion on Biometric computer security systems
Your posts are moderated
Related Questions
Describe the difference between dna and protein. (structural unit, linkage bond, primary and spatial structure)

CYTOCHEMISTR Y OF PROTOPLASM - It is supper mixture or mixture of mixtures . 3 4 elements present in it. 1 3 elements are universal. e.g. C, H, O, N, P, K, S,

Mechanism of Carcinogenesis In the preceding sub-section you learnt that carcinogenesis is a multistep process. Even though cancer may be caused by many agents chemical, p

Side Effects of Sedatives and Hypnotics: Side effects are same  like anti anxiety drugs such as hypotension, palpitation, syncope (fainting), change in libido, physical or psy

Define Initiation phase - mechanism of protein synthesis ? The assembly of a ribosome on an mRNA molecule at the correct start point, the initiation codon. Three initiation fac

Describe Class Echinoidea in animal kingdom? Sand dollars and sea urchins either have flattened disc-like bodies, or are somewhat spherical. While they lack the typical five-ar

Ask quesWhat type of antigenic agents may constitute vaccines? tion #Minimum 100 words accepted#

Q. Describe Coronary Spasm? Usually spasm develops at the site of subcritical or critical stenoses, but it may also occur in angiographically normal coronary arteries, the so c

This is a broadly used screening technique that find several genomic mutations in wide number of samples, this technique finds sequence variations because of point mutations or oth

Absorption of proteins in infants In  infants, permeability of  the  intestine appears to be greater than  in  later  life, and some  large  protein molecules such as antibodie