Biometric computer security systems, Biology

Assignment Help:

By the technology development, the price of computer has become lower and lower. For this reason, a majority of family can afford this technology. A large amount of applications software were made for personal used computer. In addition, computer is not only a communication, entertainment and business tool; it also plays a role of information storage tool. For example, people will store their privacy information in personal computer, companies and organization will store their business record and employees information in computer. Moreover, the ministry of national defense will also store their country's confidentiality in computer. Therefore, computer's security is extremely important for every user.

On another aspect, a lot of hackers are appearing while computer is developing. Inventors also concentrate on security development after they realize this problem. From the early physical key protection, user name and password to biometric protection on nowadays, the protection of computer has catch up with the latest security problems. Obviously, security development is looking for a unique accessing path for every user. According to Reid (2004, p. 8), biometric computer security systems tie a unique physical attribute of a user to the IT resources and data that they are allowed to access. For this reason, biometric computer security systems basically achieve the purpose of security development.

As the literal meaning of the term biometric computer security systems, it is a special method for security system to recognize the unique parts of human. In this information age, a lot of biometric technologies have come out for security, such as fingerprint, hand geometry, retina, iris, face, signature and voice (Biometric Security Technology 2009). In addition, most of the technologies that mentioned above are commonly used on personal computer and human's daily life. This report will focus on these technology used on computer security problems and compare their benefits and drawbacks.


Related Discussions:- Biometric computer security systems

How do populations of predators vary in predatism, How do populations of pr...

How do populations of predators and prey vary in predatism? Whenever a predator population enhances at the first moment the prey population tends to decrease. At a second momen

Can serotonin used in consciousness, Q. Can Serotonin used in consciousness...

Q. Can Serotonin used in consciousness? Serotonin complements the action of noradrenalin and acetylcholine in promoting wakefulness and cortical responsiveness. Experiments pro

Describe primitive anaerobic eukaryotic cells, Q. How can the hypothesis th...

Q. How can the hypothesis that asserts that chloroplasts as well as mitochondria were primitive prokaryotes that related in mutualism with primitive anaerobic eukaryotic cells be c

Determine the two different alleles, What is meant by saying that in relati...

What is meant by saying that in relation to a given trait conditioned by a gene with two different alleles the gametes are always "pure"? To say that gametes are pure means tha

Infectious bronchitis (ib), I nfectious bronchitis (IB) Infectious bro...

I nfectious bronchitis (IB) Infectious bronchitis is a highly contagious respiratory disease of poultry, caused by a virus belonging to the family Coronaviridae. Its existence

Major groups into which the study of the plants is divided, Q. What are the...

Q. What are the four major groups into which the study of the plants is divided? In Botany the plant kingdom is divided into pteridophytes, bryophytes, angiosperms and gymnospe

Ways in which genetic recombination occurs during meiosis, Define two ways ...

Define two ways in which genetic recombination occurs during meiosis. Genetic recombination happens during crossing- over and independent assortment.

Main prophylactic measures against hookworm disease, Q. What are the main p...

Q. What are the main prophylactic measures against hookworm disease? The major prophylactic measures against hookworm disease are to avoid walking barefoot on soils suspected o

Utalize the nonoxidative portion of the pentose phosphate, Under conditions...

Under conditions when a cell only needs to use the nonoxidative portion of the Pentose Phosphate pathway to synthesize ribose-5-phosphate, the elevated levels of NADPH in the cell

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd