Biometric computer security systems, Biology

Assignment Help:

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.


Related Discussions:- Biometric computer security systems

Describe some food borne diseases, Q. Describe some Food borne disease? ...

Q. Describe some Food borne disease? Food borne diseases are caused by the ingestion of foods containing toxic or infectious agents. In India, the diseases transmitted by foo

Concept of production - ecosystems, Concept of Production - Ecosystems ...

Concept of Production - Ecosystems The ecosystems are unable to function, unless there is a constant input of energy from an external source that is sun. Solar energy enters t

Describe the mechanism responsible for the cessation, Describe a. the facto...

Describe a. the factors responsible for promoting lactation, and b. the mechanism responsible for the cessation of lactation when a mother weans her baby.

Determine the way to verify the genotype of that animal, Some animals, such...

Some animals, such as cows, normally make only one offspring from each mating. If a cow showed a dominant phenotype, why would a typical testcross be a complex way to verify the ge

Define characteristics of phylum nematode, Review of Characteristics of Phy...

Review of Characteristics of Phylum Nematode and Its Position in Animal Classification? Nematodes may be free-living or parasites of plants or animals. however, all nematode

Explain nutritional support management for radiation therapy, Explain Nutri...

Explain Nutritional Support Management for radiation therapy? For managing these patients on radiation therapy, the following measures can be under taken: 1. Administration

Organs in animal - excretion, Normal 0 false false false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Explain about crossing over, What is crossing over? How is meiosis related ...

What is crossing over? How is meiosis related to this phenomenon? Linked alleles, for instance, A-b and a-B, form the gametes A-b and a-B that maintain the linkage of the allel

Energy yield of citric acid cycle , Each of the three NADH molecules formed...

Each of the three NADH molecules formed per turn of the cycle yields 3 ATPs and the one FADH2 yields 2 ATPs by oxidative phosphorylation (whereas some measurements indicate in whic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd