Biometric computer security systems, Biology

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.

Posted Date: 4/2/2013 2:43:04 AM | Location : United States

Related Discussions:- Biometric computer security systems, Assignment Help, Ask Question on Biometric computer security systems, Get Answer, Expert's Help, Biometric computer security systems Discussions

Write discussion on Biometric computer security systems
Your posts are moderated
Related Questions
This is a rare manifestation seen in less than 5 per cent of ARF patients. It is erythematous, macular, evanescent, non-pruritic rash with pale centre and serpiginous or rounded bo

Oligosaccharides Compounds containing 2 to 6 monosaccharides units joined by a glycosidic  linkage.

Sporophytic and Gametophytic Self-Incompatibility Besides the categories based on morphology, self incompatibility can be further classified into sporophytic or gametophytic t

At 1 AM, a healthy squid giant axon is placed in a bath of normal squid physiological extracellular saline and is internally perfused with normal squid intracellular saline.  I

Animals vs Plants Organisms are of two main types animals and plants, although all the above mentioned Unifying concepts of Biology apply equally to both animals and plants, ye

How can the binding of two amino acids for the peptide formation be described? A peptide is formed when a carbon from the carboxyl group of one amino acid is linked to the nitr

Polyenes: amphotericin b Amphotericin B products are the only polyenes currently available for systemic treatment of fungal infections.  Nystatin, another polyene, is only avai

a 6th grade student friendly definition?

what is allele

Plasma membrane and cell wall is not the similar thing. Plasma membrane, also known as cell membrane, is the outer membrane common to all living cells and it is made of a phospholi