Biometric computer security systems, Biology

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.

Posted Date: 4/2/2013 2:43:04 AM | Location : United States







Related Discussions:- Biometric computer security systems, Assignment Help, Ask Question on Biometric computer security systems, Get Answer, Expert's Help, Biometric computer security systems Discussions

Write discussion on Biometric computer security systems
Your posts are moderated
Related Questions
Organ Systems :  Organisms are composed of organ systems. Each organ system is made up of several different organs. For example, the digestive system is composed of several organ

Biological Stress Since in nature, the various organisms do not live in complete isolation from others, stress to a plant species might also be caused by what other organisms

list the major species of echinodermata

What is Palliative Outflow Patch ? Brock described closed pulmonary valvotomy and infundibular resection using a punch on a beating heart. When both pulmonary arteries are not

Define some major source of sodium and chloride? The major source of sodium and chloride is common salt added to our food in the form of sodium chloride. Naturally occurring so

B l ac k q u ar t e r The disease is otherwise known as black leg or emphysematous gangrene, and it is associated with severe toxaemia, emphysematous swelling of muscl

Tumor Suppressor Genes Tumor suppressor genes or anti-oncogenes generally inhibit cell division in cooperation with proto-oncogenes. The very existence of these genes prevent

T hese are some important uses of biodiversity. 1.   Source of food, medicines and drugs: (a)       Wheat, rice and maize are three carbohydrate rich crops and contribute

ORGA N TRANSPLANT REJECTION - Major histocompatibility complex is responsible for stimulating the rejection of tissue MHC is set of genes that code for cell surface glycopr

Dormancy - Plant Growth Substances Dormancy can be defined as a state of suspended growth and metabolism. When most plants are exposed to seasonal periods of very inclement we