Biometric computer security systems, Biology

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.

Posted Date: 4/2/2013 2:43:04 AM | Location : United States







Related Discussions:- Biometric computer security systems, Assignment Help, Ask Question on Biometric computer security systems, Get Answer, Expert's Help, Biometric computer security systems Discussions

Write discussion on Biometric computer security systems
Your posts are moderated
Related Questions
Determine which of the following observations (A-J) could lead to a testable hypothesis. For those that are testable: Write a hypothesis and null hypothesis What would be your expe

Amino Acid - compound with an amino group and a carboxyl group attached to a central carbon Proteins make up 50% of dry mass of cells in our bodies E.g. of proteins are

Explain the  concept  of  selective  breeding a) Understood  the  concept  of  selective  breeding  and/or  were  able  to  use  their Knowledge  of  Mendelian  genetics  to  e

Automated DNA sequencing is now common place which is based on the chain termination method but using a fluorescent dye attached to an oligonucleotide primer instead of using radio

How will the urine concentration be affected if the henle''s loop of a person is removed and his PCT is joined directly with DCT?

Explain the Swab Method? Swab method is the oldest and widely used method in food and dairy industry and was developed by W.A. Manheimer and T. Ybanez in 1917. A sterile cotton

How did Alfred Hershey and Martha chase arrive at the conclusion that DNA is the Genetic material?

Q. What is the life cycle of the gymnosperms? As all plants they present a diplobiontic life cycle that is alternation of generations with haploid and diploid stages and the la

What is Panoramic X-Ray This is one of the most vital radiological techniques in planning placement of dental implants. Not only will it give you the complete picture of the pe

Explain Pulmonary Atresia With Intact Ventricular Septum ? The direct communications between RV and PA is absent. The PDA is major source of blood flow to lungs From Aorta. The